Vulnerabilites related to intel - xeon
var-201906-1229
Vulnerability from variot
Insufficient session validation in the service API for Intel(R) RWC3 version 4.186 and before may allow an unauthenticated user to potentially enable escalation of privilege via network access. Intel RAID Web Console 3 is prone to a privilege-escalation vulnerability. A remote attacker can exploit this issue to gain elevated privileges. Intel RAID Web Console 3 4.186 and prior are vulnerable. There is a security vulnerability in the service API of Intel RWC3 4.186 and earlier versions. The vulnerability is caused by the program not fully authenticating the session
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1229", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "raid web console 3", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "4.186" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "34.186" }, { "model": "raid web console", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "34.185" }, { "model": "raid web console", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "37.009.011.000" } ], "sources": [ { "db": "BID", "id": "108780" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11119" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alexander Gutkin", "sources": [ { "db": "BID", "id": "108780" }, { "db": "CNNVD", "id": "CNNVD-201906-575" } ], "trust": 0.9 }, "cve": "CVE-2019-11119", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-11119", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-142733", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-11119", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-11119", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201906-575", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-142733", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-11119", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142733" }, { "db": "VULMON", "id": "CVE-2019-11119" }, { "db": "CNNVD", "id": "CNNVD-201906-575" }, { "db": "NVD", "id": "CVE-2019-11119" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient session validation in the service API for Intel(R) RWC3 version 4.186 and before may allow an unauthenticated user to potentially enable escalation of privilege via network access. Intel RAID Web Console 3 is prone to a privilege-escalation vulnerability. \nA remote attacker can exploit this issue to gain elevated privileges. \nIntel RAID Web Console 3 4.186 and prior are vulnerable. There is a security vulnerability in the service API of Intel RWC3 4.186 and earlier versions. The vulnerability is caused by the program not fully authenticating the session", "sources": [ { "db": "NVD", "id": "CVE-2019-11119" }, { "db": "BID", "id": "108780" }, { "db": "VULHUB", "id": "VHN-142733" }, { "db": "VULMON", "id": "CVE-2019-11119" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11119", "trust": 2.9 }, { "db": "BID", "id": "108780", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-575", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-18597", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-142733", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142733" }, { "db": "VULMON", "id": "CVE-2019-11119" }, { "db": "BID", "id": "108780" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-575" }, { "db": "NVD", "id": "CVE-2019-11119" } ] }, "id": "VAR-201906-1229", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142733" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T21:15:41.606000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel RAID Web Console 3 Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93797" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11119" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-575" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142733" }, { "db": "NVD", "id": "CVE-2019-11119" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/108780" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142733" }, { "db": "VULMON", "id": "CVE-2019-11119" }, { "db": "BID", "id": "108780" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-575" }, { "db": "NVD", "id": "CVE-2019-11119" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142733" }, { "db": "VULMON", "id": "CVE-2019-11119" }, { "db": "BID", "id": "108780" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-575" }, { "db": "NVD", "id": "CVE-2019-11119" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142733" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11119" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108780" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-575" }, { "date": "2019-06-13T16:29:01.327000", "db": "NVD", "id": "CVE-2019-11119" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-01T00:00:00", "db": "VULHUB", "id": "VHN-142733" }, { "date": "2023-03-01T00:00:00", "db": "VULMON", "id": "CVE-2019-11119" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108780" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-575" }, { "date": "2024-11-21T04:20:34.063000", "db": "NVD", "id": "CVE-2019-11119" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-575" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-575" } ], "trust": 0.6 } }
var-201808-0958
Vulnerability from variot
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis. These attacks are known as L1 Terminal Fault: SGX, L1 Terminal Fault: OS/SMM, and L1 Terminal Fault: VMM. Multiple Intel Processors are prone to a multiple information-disclosure vulnerabilities. Local attackers can exploit these issues to obtain sensitive information. This may aid in further attacks. Intel Core i3 processor, etc. are all CPU (central processing unit) products of Intel Corporation of the United States. The following products are affected: Intel Core i3 processor; Intel Core i5 processor; Intel Core i7 processor; Intel Core M processor family; 2nd generation Intel Core processors; 3rd generation Intel Core processors; 4th generation Intel Core processors; 5th generation Intel Core processors, etc. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. 7) - noarch, x86_64
- Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. (BZ#1594915)
Bug Fix(es):
-
Due to a bug in a CPU's speculative execution engine, the CPU could previously leak data from other processes on the system, including passwords, encryption keys, or other sensitive information. With this update, the kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Expoline for IBM z Systems. As a result, data leak no longer occurs under the described circumstances. (BZ#1577761)
-
6) - i386, x86_64
Bug Fix(es):
-
The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the page vectors were cleared only if they were full. Subsequently, the amount of memory held in page vectors, which is not reclaimable, was sometimes too high. Consequently the page reclamation started the Out of Memory (OOM) killing processes. With this update, the underlying source code has been fixed to clear LRU page vectors each time when a compound page is added to them. As a result, OOM killing processes due to high amounts of memory held in page vectors no longer occur. (BZ#1575819)
-
========================================================================= Ubuntu Security Notice USN-3741-2 August 14, 2018
linux-lts-xenial, linux-aws vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS.
It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). (CVE-2018-3646)
It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. A remote attacker could use this to cause a denial of service. (CVE-2018-5390)
Juha-Matti Tilli discovered that the IP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packet fragments. A remote attacker could use this to cause a denial of service. (CVE-2018-5391)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: linux-image-4.4.0-1027-aws 4.4.0-1027.30 linux-image-4.4.0-133-generic 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-generic-lpae 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-lowlatency 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc-e500mc 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc-smp 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc64-emb 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc64-smp 4.4.0-133.159~14.04.1 linux-image-aws 4.4.0.1027.27 linux-image-generic-lpae-lts-xenial 4.4.0.133.113 linux-image-generic-lts-xenial 4.4.0.133.113 linux-image-lowlatency-lts-xenial 4.4.0.133.113 linux-image-powerpc-e500mc-lts-xenial 4.4.0.133.113 linux-image-powerpc-smp-lts-xenial 4.4.0.133.113 linux-image-powerpc64-emb-lts-xenial 4.4.0.133.113 linux-image-powerpc64-smp-lts-xenial 4.4.0.133.113
Please note that the recommended mitigation for CVE-2018-3646 involves updating processor microcode in addition to updating the kernel; however, the kernel includes a fallback for processors that have not received microcode updates.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2384-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2384 Issue date: 2018-08-14 CVE Names: CVE-2017-13215 CVE-2018-3620 CVE-2018-3646 CVE-2018-3693 CVE-2018-5390 CVE-2018-7566 CVE-2018-10675 ==================================================================== 1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch, ppc64le
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
-
Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
-
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
-
A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
-
kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)
-
kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
-
kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:
https://access.redhat.com/articles/3527791
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1535173 - CVE-2017-13215 kernel: crypto: privilege escalation in skcipher_recvmsg function 1550142 - CVE-2018-7566 kernel: race condition in snd_seq_write() may lead to UAF or OOB-access 1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact 1581650 - CVE-2018-3693 Kernel: speculative bounds check bypass store 1585005 - CVE-2018-3646 Kernel: hw: cpu: L1 terminal fault (L1TF) 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: kernel-3.10.0-862.11.6.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: kernel-3.10.0-862.11.6.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: kernel-3.10.0-862.11.6.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
ppc64: kernel-3.10.0-862.11.6.el7.ppc64.rpm kernel-bootwrapper-3.10.0-862.11.6.el7.ppc64.rpm kernel-debug-3.10.0-862.11.6.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm kernel-devel-3.10.0-862.11.6.el7.ppc64.rpm kernel-headers-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.ppc64.rpm perf-3.10.0-862.11.6.el7.ppc64.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm python-perf-3.10.0-862.11.6.el7.ppc64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm
ppc64le: kernel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm perf-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm
s390x: kernel-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm kernel-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-headers-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm perf-3.10.0-862.11.6.el7.s390x.rpm perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm python-perf-3.10.0-862.11.6.el7.s390x.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm
x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
ppc64le: kernel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm perf-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm
s390x: kernel-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm kernel-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-headers-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm perf-3.10.0-862.11.6.el7.s390x.rpm perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm python-perf-3.10.0-862.11.6.el7.s390x.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm
ppc64le: kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm
x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
noarch: kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
ppc64le: kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: kernel-3.10.0-862.11.6.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2017-13215 https://access.redhat.com/security/cve/CVE-2018-3620 https://access.redhat.com/security/cve/CVE-2018-3646 https://access.redhat.com/security/cve/CVE-2018-3693 https://access.redhat.com/security/cve/CVE-2018-5390 https://access.redhat.com/security/cve/CVE-2018-7566 https://access.redhat.com/security/cve/CVE-2018-10675 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/L1TF https://access.redhat.com/articles/3527791
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBW3MjONzjgjWX9erEAQioYA/9Ge//K50oCrGaDEMuI2PHYLcztiZt9meh C578LP6sC/HT17VAbV8C+Tvy9QBCU80t4mGU4GOPu8Q5HzZQv45n0NtdRTGCC+yb A1bFcf0vhXIALNsuDEZN9g5SwUBapxkRoh43R+E7ITCQWp0XIPaSjYgGNqpTTuD/ lxRCzc10HhxW+pUY+ERFcK6c0poc14FtSqM3GqZe10FhkykdIlmngFjkthjzefXO dUkYDy53G+iAdTrVFI03h3Wt+UBMmNwKtu8ydqtAxZ0zDZIP5ijASOtM4mlf77ec VsNn7OWythkpTcpa+Sh5+dk6DK+lU2vziVsEocYNpzB+T/aHC9n/+I8ibfp3B4DC k4lYqZJQDFR2jVABjkOVS9dWFlOYKFmU2JBwsqdRvt3rgVFXEH3n5OQydHGFskmP NFwDbRAFlwo3zjd9KuiQzdFTOensc35+eSHykY8nxY2hGMH5gGccShFL4C7N2mtx s8JnzA/Zj00VHMg8qIHGfQ7RSd/xyEJ5vn87WZcTshTNli6x1/0VnzpTKG85Ga+K S2EJDXFP9LqCT98TL1RDJmCTtfDjU3I/gbgu5xFaofQZfV48qAUomUQ2E+MhQAOX eBr/OvlfFP8HEwVEJBDtXKxxs1LgmjTSqOtfP8AvS5zI9/Y6o56i0d7Ng1CcaGKP lZgWJhC3Yik=i4St -----END PGP SIGNATURE-----
-- RHSA-announce mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhsa-announce . These CVEs are security vulnerabilities caused by flaws in the design of speculative execution hardware in the computer's CPU.
Details on the vulnerability and our response can be found here: https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/L1TF
Due to the high complexity of the fixes and the need for a corresponding CPU microcode update for a complete fix, we are unable to livepatch these CVEs. Please plan to reboot into an updated kernel as soon as possible.
References: CVE-2018-3620, and CVE-2018-3646
-- ubuntu-security-announce mailing list [email protected] Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201810-06
https://security.gentoo.org/
Severity: Normal Title: Xen: Multiple vulnerabilities Date: October 30, 2018 Bugs: #643350, #655188, #655544, #659442 ID: 201810-06
Synopsis
Multiple vulnerabilities have been found in Xen, the worst of which could cause a Denial of Service condition.
Background
Xen is a bare-metal hypervisor.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulation/xen < 4.10.1-r2 >= 4.10.1-r2 2 app-emulation/xen-tools < 4.10.1-r2 >= 4.10.1-r2 ------------------------------------------------------------------- 2 affected packages
Description
Multiple vulnerabilities have been discovered in Xen. Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Xen users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.10.1-r2"
All Xen tools users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.10.1-r2"
References
[ 1 ] CVE-2017-5715 https://nvd.nist.gov/vuln/detail/CVE-2017-5715 [ 2 ] CVE-2017-5753 https://nvd.nist.gov/vuln/detail/CVE-2017-5753 [ 3 ] CVE-2017-5754 https://nvd.nist.gov/vuln/detail/CVE-2017-5754 [ 4 ] CVE-2018-10471 https://nvd.nist.gov/vuln/detail/CVE-2018-10471 [ 5 ] CVE-2018-10472 https://nvd.nist.gov/vuln/detail/CVE-2018-10472 [ 6 ] CVE-2018-10981 https://nvd.nist.gov/vuln/detail/CVE-2018-10981 [ 7 ] CVE-2018-10982 https://nvd.nist.gov/vuln/detail/CVE-2018-10982 [ 8 ] CVE-2018-12891 https://nvd.nist.gov/vuln/detail/CVE-2018-12891 [ 9 ] CVE-2018-12892 https://nvd.nist.gov/vuln/detail/CVE-2018-12892 [ 10 ] CVE-2018-12893 https://nvd.nist.gov/vuln/detail/CVE-2018-12893 [ 11 ] CVE-2018-15468 https://nvd.nist.gov/vuln/detail/CVE-2018-15468 [ 12 ] CVE-2018-15469 https://nvd.nist.gov/vuln/detail/CVE-2018-15469 [ 13 ] CVE-2018-15470 https://nvd.nist.gov/vuln/detail/CVE-2018-15470 [ 14 ] CVE-2018-3620 https://nvd.nist.gov/vuln/detail/CVE-2018-3620 [ 15 ] CVE-2018-3646 https://nvd.nist.gov/vuln/detail/CVE-2018-3646 [ 16 ] CVE-2018-5244 https://nvd.nist.gov/vuln/detail/CVE-2018-5244 [ 17 ] CVE-2018-7540 https://nvd.nist.gov/vuln/detail/CVE-2018-7540 [ 18 ] CVE-2018-7541 https://nvd.nist.gov/vuln/detail/CVE-2018-7541 [ 19 ] CVE-2018-7542 https://nvd.nist.gov/vuln/detail/CVE-2018-7542
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201810-06
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to [email protected] or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201808-0958", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "930" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "720qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2655le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y31" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6585r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8550u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150t" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10c" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "740qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920xm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3630qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4720hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4000m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2405s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8100" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2435m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3380m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2410m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3317u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700ec" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3339y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "460m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2620m" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y32" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2960xm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "840qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4500u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4400e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5750hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2760qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "650" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6685r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "970" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5550u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3225" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6260u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "875k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350h" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3840qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4308u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2920xm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2340ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712mq" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y30" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3230m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2720qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775c" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3227u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "*" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675c" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702mq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5557u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5157u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2629m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2380p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5257u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700mq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4005u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640lm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600t" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y57" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "820qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2675qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5300u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3475s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340te" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310u" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2637m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5200u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "580m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4260u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4750hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4785t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4722hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5500u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8650u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2375m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5600u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430um" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3720qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770te" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820eq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "670" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "960" }, { "model": "core m7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y75" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2102" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440eq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610me" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2700k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "470um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2649m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6402p" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "610e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2300" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660lm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2390t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2617m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2515e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3667u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2467m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2557m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4578u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4800mq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "350m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2550k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3689y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4910mq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hk" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6287u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3350p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4202y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3437u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100h" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700eq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7500u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8250u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2320" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6157u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4550u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3520m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7660u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4410e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980x" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y51" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4250u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "370m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2430m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2357m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6006u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4158u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217ue" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3360m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2348m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4012y" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y70" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4771" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3229y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5650u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620ue" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "480m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620lm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4278u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3130m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6200u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4510u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2640m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200m" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y71" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2125" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2370m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3427u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5575r" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4558u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710mq" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y30" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2630qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517ue" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4422e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3320m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3245" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2510e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2312m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3632qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5015u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6267u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3687u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3635qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6167u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7567u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4765t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "965" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3115c" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5287u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940xm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660ue" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "975" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2635qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4760hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "655k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200h" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "990x" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4102e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8600k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4960hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4810mq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7600u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5950hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210h" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6442eq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3439y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2365m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6098p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120me" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7560u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4288u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y75" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4900mq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2537m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6102e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3555le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5020u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "661" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2677m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4302y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4258u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3337u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2657m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5010u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5250u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2377m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2115c" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2710qe" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "880" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3820qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2520m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4120u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2350m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4220y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2367m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3740qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6350hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4980hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6320" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5005u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2715qe" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4020y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2130" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "450m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850hq" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10a" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2610ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "390m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2328m" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y54" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380um" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2105" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4025u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6360u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7920hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3537u" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "2.0" }, { "model": "proliant dl560 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "dsm", "scope": "eq", "trust": 0.3, "vendor": "synology", "version": "5.2" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.7" }, { "model": "proliant ml350e gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant m710p server cartridge", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl170h g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant xl260a gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant ml330 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "core x-series processor family for intel platforms", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "x990" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "cloudline cl5800 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v40" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "18030" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-6.6" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.1.6" }, { "model": "proliant ml150 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.5" }, { "model": "proliant xl170r gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant sl160z g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl560 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-6.5" }, { "model": "proliant xl190r gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.2.3" }, { "model": "proliant xl750f gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.1.4" }, { "model": "sgi uv", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "20000" }, { "model": "xeon processor scalable family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "cloudline cl2100 g3 807s 12g 8sff", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xeon processor d-2100", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "proliant dl180 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v20" }, { "model": "fusion", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "10.0" }, { "model": "virtualization host", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "proliant sl170z g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant m710 server cartridge", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl370 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "proliant dl180 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.2.2" }, { "model": "proliant dl360p gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant ml310e gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "v20" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.0.3" }, { "model": "proliant bl280c g6 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.4.3" }, { "model": "proliant ml370 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "7.3.1" }, { "model": "proliant bl460c g7 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.6" }, { "model": "proliant bl460c g6 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant thin micro tm200 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl380e gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant bl620c g7 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cloudline cl4100 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.0.1" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "7.5" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.2" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.7" }, { "model": "enterprise linux server update services for sap solutions", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "proliant ml350 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.6" }, { "model": "proliant dl120 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.5" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20120" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.5.3" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.2.3" }, { "model": "skynas", "scope": "eq", "trust": 0.3, "vendor": "synology", "version": "0" }, { "model": "proliant dl160 gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017030" }, { "model": "core x-series processor family for intel platforms", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "x2990" }, { "model": "proliant xl250a gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.2.0" }, { "model": "enterprise linux for arm", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "647" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.1.4" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "17090" }, { "model": "c880 m5 server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "7.0" }, { "model": "proliant ws460c gen9 workstation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.5" }, { "model": "proliant dl120 g7 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl380 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cloudline cl2100 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant bl685c g7 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.4.0" }, { "model": "enterprise linux server update services for sap solutions", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7." }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1018030" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.0.4" }, { "model": "2nd generation core processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.1.1" }, { "model": "enterprise linux for real time", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.5" }, { "model": "cloudline cl5200 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "56000" }, { "model": "proliant ml110 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "proliant bl490c g7 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "fusion pro", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "10.1.1" }, { "model": "proliant dl385 g7 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "36000" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.1.0" }, { "model": "windows server r2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20120" }, { "model": "enterprise linux for ibm z systems", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.11" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v20" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "55000" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-6.7" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v40" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.3.2" }, { "model": "fusion pro", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "10.1.2" }, { "model": "synergy gen9 compute module", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4800" }, { "model": "proliant dl580 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.1.5" }, { "model": "dsm", "scope": "eq", "trust": 0.3, "vendor": "synology", "version": "6.1" }, { "model": "synergy gen9 compute module", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6200" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.1" }, { "model": "synergy gen10 compute module", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4800" }, { "model": "proliant dl160 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cloudline cl3100 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant ml150 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "5th generation core processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "c880 m4 server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "apollo gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "42000" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.4.2" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.1.3" }, { "model": "proliant dl580 g7 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "7th generation core processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "3rd generation core processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.0.3" }, { "model": "vsphere integrated containers", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.2" }, { "model": "windows server r2 for x64-based systems sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "cloudline cl2200 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vsphere integrated containers", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.3.1" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.8" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2016" }, { "model": "sgi uv", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3000" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.7" }, { "model": "enterprise linux for power little endian extended update supp", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.5" }, { "model": "enterprise linux for power little endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "integrity superdome with bl920s gen9 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "x0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.7" }, { "model": "cloudline cl2100 g3 806r 8sff", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-6.6" }, { "model": "windows server for x64-based systems sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.3.0" }, { "model": "operating system", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "enterprise linux for power little endian extended update supp", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "proliant dl980 g7 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "proliant sl210t gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "sgi uv", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10000" }, { "model": "cloudline cl2100 g3 407s 12g 4lff", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.0.2" }, { "model": "core i3 processor", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "6th generation core processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.2.5" }, { "model": "superdome flex server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vsphere integrated containers", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.3" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "virtual machine manager", "scope": "eq", "trust": 0.3, "vendor": "synology", "version": "0" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v40" }, { "model": "proliant ml110 g7 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.2.2" }, { "model": "proliant dl580 gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "identity manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.1" }, { "model": "proliant ml30 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux for ibm system z", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "integrity mc990 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "x0" }, { "model": "proliant ml110 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.10" }, { "model": "proliant bl490c g6 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl360 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant m710x server cartridge", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "virtualization els", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017090" }, { "model": "proliant ml350 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl320 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "integrity superdome with bl920s gen8 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "x0" }, { "model": "fusion pro", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "10.0" }, { "model": "proliant xl270d gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant bl660c gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "8th generation core processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "proliant xl190r gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant xl450 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.5" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.1.4" }, { "model": "proliant bl680c g7 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.1.6.1" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1018030" }, { "model": "4th generation core processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "proliant dl180 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant xl450 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux for power little endian extended update supp", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "windows for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "8.10" }, { "model": "proliant sl160s g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl380 g7 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl170e g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant bl460c gen8 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.4" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "proliant dl380 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "windows for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "8.10" }, { "model": "system management mode", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "7.1" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "75000" }, { "model": "xenserver ltsr cu1", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "7.1" }, { "model": "cloudline cl5200 g3 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.4.1" }, { "model": "proliant dl360 g7 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "rhev hypervisor for rhel-6", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "0" }, { "model": "proliant dl360 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.4.4" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.5" }, { "model": "vsphere integrated containers", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.3.1" }, { "model": "proliant dl360 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v50" }, { "model": "virtualization els", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-6" }, { "model": "proliant sl2x170z g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "windows for 32-bit systems sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "7" }, { "model": "windows for x64-based systems sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "7" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "management agent for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "70" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1016070" }, { "model": "proliant dl360e gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "core i7 processor", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.3.1" }, { "model": "windows server for 32-bit systems sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-6.7" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.0.0" }, { "model": "proliant bl2x220c g7 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "dsm", "scope": "eq", "trust": 0.3, "vendor": "synology", "version": "6.2" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "virtualization", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.2.4" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.2.4.1" }, { "model": "synergy gen9 compute module", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6600" }, { "model": "cloudline cl2200 g3 1211r lff", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "120" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.9" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017090" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.0.2" }, { "model": "proliant ml350p gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "synergy gen10 compute module", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6600" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.0.4" }, { "model": "enterprise linux for power big endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.2.0" }, { "model": "proliant bl460c gen10 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl320e gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant ml110 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant bl420c gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.4.0" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "7.4" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "7.4" }, { "model": "proliant ml350 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant microserver gen8", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl580 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.1" }, { "model": "xeon processor d-1500", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "sgi uv", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "30000" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "vsphere integrated containers", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.1" }, { "model": "proliant sl170s g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "ucs e-series servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise linux server update services for sap solutions", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux for scientific computing", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v60" }, { "model": "proliant bl660c gen8 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-6.7" }, { "model": "300h", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "core i5 processor", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "proliant dl560 gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl380p gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.1.3" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "windows rt", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.3.0" }, { "model": "proliant xl270d gen9 accelerator tray 2u configure-to-order serv", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.4" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "7.3.0" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.5" }, { "model": "fusion", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "10.1.1" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.4.1" }, { "model": "proliant sl390s g7 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant xl230a gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "proliant xl730f gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "virtual machine manager", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "proliant bl460c gen9 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl60 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.1.5" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.6.3" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v20" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "34000" }, { "model": "proliant dl120 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.2.1" }, { "model": "fusion", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "10.1.2" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "software guard extensions", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "synergy gen9 special compute module", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6200" }, { "model": "proliant bl2x220c g6 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant xl740f gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cloudline cl3100 g3 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cloudline cl2100 g3 807s sff", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "80" }, { "model": "proliant xl230k gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "windows for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "100" }, { "model": "cloudline cl2200 g3 12g 1211r 12lff", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "7.1" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "7.0" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.7" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "3.2.1" }, { "model": "enterprise linux for power", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "97" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "cloudline cl3150 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "7.2" }, { "model": "proliant xl170r gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl380 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "core m processor family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "fusion", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "10.1" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.5.0" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xen", "version": "4.1.2" }, { "model": "proliant dl120 gen10 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1016070" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "300rl", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cloudline cl2100 g3 407s lff", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "40" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.6" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "65000" }, { "model": "proliant dl80 gen9 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017030" }, { "model": "proliant ml310e gen8 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant dl160 g6 server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proliant bl465c g7 server blade", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#982149" }, { "db": "BID", "id": "105080" }, { "db": "NVD", "id": "CVE-2018-3620" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "148941" }, { "db": "PACKETSTORM", "id": "148907" }, { "db": "PACKETSTORM", "id": "148901" }, { "db": "PACKETSTORM", "id": "148898" }, { "db": "PACKETSTORM", "id": "149142" }, { "db": "PACKETSTORM", "id": "148899" } ], "trust": 0.6 }, "cve": "CVE-2018-3620", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2018-3620", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-133651", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2018-3620", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2018-3620", "trust": 1.0, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-133651", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-3620", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-133651" }, { "db": "VULMON", "id": "CVE-2018-3620" }, { "db": "NVD", "id": "CVE-2018-3620" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis. These attacks are known as L1 Terminal Fault: SGX, L1 Terminal Fault: OS/SMM, and L1 Terminal Fault: VMM. Multiple Intel Processors are prone to a multiple information-disclosure vulnerabilities. \nLocal attackers can exploit these issues to obtain sensitive information. This may aid in further attacks. Intel Core i3 processor, etc. are all CPU (central processing unit) products of Intel Corporation of the United States. The following products are affected: Intel Core i3 processor; Intel Core i5 processor; Intel Core i7 processor; Intel Core M processor family; 2nd generation Intel Core processors; 3rd generation Intel Core processors; 4th generation Intel Core processors; 5th generation Intel Core processors, etc. These packages include redhat-release-virtualization-host,\novirt-node, and rhev-hypervisor. RHVH features a Cockpit user\ninterface for monitoring the host\u0027s resources and performing administrative\ntasks. 7) - noarch, x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n(BZ#1594915)\n\n4. \n\nBug Fix(es):\n\n* Due to a bug in a CPU\u0027s speculative execution engine, the CPU could\npreviously leak data from other processes on the system, including\npasswords, encryption keys, or other sensitive information. With this\nupdate, the kernel build requirements have been updated to the GNU Compiler\nCollection (GCC) compiler version that has the support for Expoline for IBM\nz Systems. As a result, data leak no longer occurs under the described\ncircumstances. (BZ#1577761)\n\n4. 6) - i386, x86_64\n\n3. \n\nBug Fix(es):\n\n* The Least recently used (LRU) operations are batched by caching pages in\nper-cpu page vectors to prevent contention of the heavily used lru_lock\nspinlock. The page vectors can hold even the compound pages. Previously,\nthe page vectors were cleared only if they were full. Subsequently, the\namount of memory held in page vectors, which is not reclaimable, was\nsometimes too high. Consequently the page reclamation started the Out of\nMemory (OOM) killing processes. With this update, the underlying source\ncode has been fixed to clear LRU page vectors each time when a compound\npage is added to them. As a result, OOM killing processes due to high\namounts of memory held in page vectors no longer occur. (BZ#1575819)\n\n4. =========================================================================\nUbuntu Security Notice USN-3741-2\nAugust 14, 2018\n\nlinux-lts-xenial, linux-aws vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux\nHardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu\n14.04 LTS. \n\nIt was discovered that memory present in the L1 data cache of an Intel CPU\ncore may be exposed to a malicious process that is executing on the CPU\ncore. A local\nattacker in a guest virtual machine could use this to expose sensitive\ninformation (memory from other guests or the host OS). (CVE-2018-3646)\n\nIt was discovered that memory present in the L1 data cache of an Intel CPU\ncore may be exposed to a malicious process that is executing on the CPU\ncore. A remote attacker could use this to cause a\ndenial of service. (CVE-2018-5390)\n\nJuha-Matti Tilli discovered that the IP implementation in the Linux kernel\nperformed algorithmically expensive operations in some situations when\nhandling incoming packet fragments. A remote attacker could use this to\ncause a denial of service. (CVE-2018-5391)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n linux-image-4.4.0-1027-aws 4.4.0-1027.30\n linux-image-4.4.0-133-generic 4.4.0-133.159~14.04.1\n linux-image-4.4.0-133-generic-lpae 4.4.0-133.159~14.04.1\n linux-image-4.4.0-133-lowlatency 4.4.0-133.159~14.04.1\n linux-image-4.4.0-133-powerpc-e500mc 4.4.0-133.159~14.04.1\n linux-image-4.4.0-133-powerpc-smp 4.4.0-133.159~14.04.1\n linux-image-4.4.0-133-powerpc64-emb 4.4.0-133.159~14.04.1\n linux-image-4.4.0-133-powerpc64-smp 4.4.0-133.159~14.04.1\n linux-image-aws 4.4.0.1027.27\n linux-image-generic-lpae-lts-xenial 4.4.0.133.113\n linux-image-generic-lts-xenial 4.4.0.133.113\n linux-image-lowlatency-lts-xenial 4.4.0.133.113\n linux-image-powerpc-e500mc-lts-xenial 4.4.0.133.113\n linux-image-powerpc-smp-lts-xenial 4.4.0.133.113\n linux-image-powerpc64-emb-lts-xenial 4.4.0.133.113\n linux-image-powerpc64-smp-lts-xenial 4.4.0.133.113\n\nPlease note that the recommended mitigation for CVE-2018-3646 involves\nupdating processor microcode in addition to updating the kernel;\nhowever, the kernel includes a fallback for processors that have not\nreceived microcode updates. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel security and bug fix update\nAdvisory ID: RHSA-2018:2384-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:2384\nIssue date: 2018-08-14\nCVE Names: CVE-2017-13215 CVE-2018-3620 CVE-2018-3646\n CVE-2018-3693 CVE-2018-5390 CVE-2018-7566\n CVE-2018-10675\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch, ppc64le, s390x\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch, ppc64le\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to\nefficiently use available system resources and provide inter-domain\nprotection through access control and isolation. The L1TF issue was found\nin the way the x86 microprocessor designs have implemented speculative\nexecution of instructions (a commonly used performance optimisation) in\ncombination with handling of page-faults caused by terminated virtual to\nphysical address resolving process. As a result, an unprivileged attacker\ncould use this flaw to read privileged memory of the kernel or other\nprocesses and/or cross guest/host boundaries to read host memory by\nconducting targeted cache side-channel attacks. (CVE-2018-3620,\nCVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions past bounds\ncheck. The flaw relies on the presence of a precisely-defined instruction\nsequence in the privileged code and the fact that memory writes occur to an\naddress which depends on the untrusted value. Such writes cause an update\ninto the microprocessor\u0027s data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to influence speculative\nexecution and/or read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled\nspecially crafted TCP packets. A remote attacker could use this flaw to\ntrigger time and calculation expensive calls to tcp_collapse_ofo_queue()\nand tcp_prune_ofo_queue() functions by sending specially modified packets\nwithin ongoing TCP sessions which could lead to a CPU saturation and hence\na denial of service on the system. Maintaining the denial of service\ncondition requires continuous two-way TCP sessions to a reachable open\nport, thus the attacks cannot be performed using spoofed IP addresses. \n(CVE-2018-5390)\n\n* kernel: crypto: privilege escalation in skcipher_recvmsg function\n(CVE-2017-13215)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS\nor other unspecified impact (CVE-2018-10675)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB access\n(CVE-2018-7566)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting\nCVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl\nWaldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and\nJuha-Matti Tilli (Aalto University, Department of Communications and\nNetworking and Nokia Bell Labs) for reporting CVE-2018-5390. \n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space\nprecludes documenting all of the bug fixes in this advisory. See the\ndescriptions in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/3527791\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1535173 - CVE-2017-13215 kernel: crypto: privilege escalation in skcipher_recvmsg function\n1550142 - CVE-2018-7566 kernel: race condition in snd_seq_write() may lead to UAF or OOB-access\n1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact\n1581650 - CVE-2018-3693 Kernel: speculative bounds check bypass store\n1585005 - CVE-2018-3646 Kernel: hw: cpu: L1 terminal fault (L1TF)\n1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debug-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-devel-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-headers-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.ppc64.rpm\nperf-3.10.0-862.11.6.el7.ppc64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\npython-perf-3.10.0-862.11.6.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\n\nppc64le:\nkernel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm\nkernel-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-headers-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm\nperf-3.10.0-862.11.6.el7.s390x.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nppc64le:\nkernel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm\nkernel-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-headers-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm\nperf-3.10.0-862.11.6.el7.s390x.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):\n\nnoarch:\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-13215\nhttps://access.redhat.com/security/cve/CVE-2018-3620\nhttps://access.redhat.com/security/cve/CVE-2018-3646\nhttps://access.redhat.com/security/cve/CVE-2018-3693\nhttps://access.redhat.com/security/cve/CVE-2018-5390\nhttps://access.redhat.com/security/cve/CVE-2018-7566\nhttps://access.redhat.com/security/cve/CVE-2018-10675\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/L1TF\nhttps://access.redhat.com/articles/3527791\n\n8. Contact:\n\nThe Red Hat security contact is \[email protected]\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nlZgWJhC3Yik=i4St\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\[email protected]\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. These CVEs are security vulnerabilities \ncaused by flaws in the design of speculative execution hardware in the \ncomputer\u0027s CPU. \n\nDetails on the vulnerability and our response can be found here:\nhttps://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/L1TF\n\nDue to the high complexity of the fixes and the need for a corresponding\nCPU microcode update for a complete fix, we are unable to livepatch these\nCVEs. Please plan to reboot into an updated kernel as soon as possible. \n\nReferences:\n CVE-2018-3620, and CVE-2018-3646\n\n-- \nubuntu-security-announce mailing list\[email protected]\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201810-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Xen: Multiple vulnerabilities\n Date: October 30, 2018\n Bugs: #643350, #655188, #655544, #659442\n ID: 201810-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Xen, the worst of which\ncould cause a Denial of Service condition. \n\nBackground\n==========\n\nXen is a bare-metal hypervisor. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-emulation/xen \u003c 4.10.1-r2 \u003e= 4.10.1-r2\n 2 app-emulation/xen-tools \u003c 4.10.1-r2 \u003e= 4.10.1-r2\n -------------------------------------------------------------------\n 2 affected packages\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Xen. Please review the\nreferenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Xen users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-emulation/xen-4.10.1-r2\"\n\nAll Xen tools users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=app-emulation/xen-tools-4.10.1-r2\"\n\nReferences\n==========\n\n[ 1 ] CVE-2017-5715\n https://nvd.nist.gov/vuln/detail/CVE-2017-5715\n[ 2 ] CVE-2017-5753\n https://nvd.nist.gov/vuln/detail/CVE-2017-5753\n[ 3 ] CVE-2017-5754\n https://nvd.nist.gov/vuln/detail/CVE-2017-5754\n[ 4 ] CVE-2018-10471\n https://nvd.nist.gov/vuln/detail/CVE-2018-10471\n[ 5 ] CVE-2018-10472\n https://nvd.nist.gov/vuln/detail/CVE-2018-10472\n[ 6 ] CVE-2018-10981\n https://nvd.nist.gov/vuln/detail/CVE-2018-10981\n[ 7 ] CVE-2018-10982\n https://nvd.nist.gov/vuln/detail/CVE-2018-10982\n[ 8 ] CVE-2018-12891\n https://nvd.nist.gov/vuln/detail/CVE-2018-12891\n[ 9 ] CVE-2018-12892\n https://nvd.nist.gov/vuln/detail/CVE-2018-12892\n[ 10 ] CVE-2018-12893\n https://nvd.nist.gov/vuln/detail/CVE-2018-12893\n[ 11 ] CVE-2018-15468\n https://nvd.nist.gov/vuln/detail/CVE-2018-15468\n[ 12 ] CVE-2018-15469\n https://nvd.nist.gov/vuln/detail/CVE-2018-15469\n[ 13 ] CVE-2018-15470\n https://nvd.nist.gov/vuln/detail/CVE-2018-15470\n[ 14 ] CVE-2018-3620\n https://nvd.nist.gov/vuln/detail/CVE-2018-3620\n[ 15 ] CVE-2018-3646\n https://nvd.nist.gov/vuln/detail/CVE-2018-3646\n[ 16 ] CVE-2018-5244\n https://nvd.nist.gov/vuln/detail/CVE-2018-5244\n[ 17 ] CVE-2018-7540\n https://nvd.nist.gov/vuln/detail/CVE-2018-7540\n[ 18 ] CVE-2018-7541\n https://nvd.nist.gov/vuln/detail/CVE-2018-7541\n[ 19 ] CVE-2018-7542\n https://nvd.nist.gov/vuln/detail/CVE-2018-7542\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201810-06\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\[email protected] or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2018 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2018-3620" }, { "db": "CERT/CC", "id": "VU#982149" }, { "db": "BID", "id": "105080" }, { "db": "VULHUB", "id": "VHN-133651" }, { "db": "VULMON", "id": "CVE-2018-3620" }, { "db": "PACKETSTORM", "id": "148941" }, { "db": "PACKETSTORM", "id": "148907" }, { "db": "PACKETSTORM", "id": "148901" }, { "db": "PACKETSTORM", "id": "148898" }, { "db": "PACKETSTORM", "id": "148916" }, { "db": "PACKETSTORM", "id": "148913" }, { "db": "PACKETSTORM", "id": "149142" }, { "db": "PACKETSTORM", "id": "148899" }, { "db": "PACKETSTORM", "id": "148934" }, { "db": "PACKETSTORM", "id": "150083" } ], "trust": 2.97 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-133651", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-133651" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3620", "trust": 2.5 }, { "db": "CERT/CC", "id": "VU#982149", "trust": 2.3 }, { "db": "BID", "id": "105080", "trust": 1.5 }, { "db": "SIEMENS", "id": "SSA-608355", "trust": 1.2 }, { "db": "SIEMENS", "id": "SSA-254686", "trust": 1.2 }, { "db": "LENOVO", "id": "LEN-24163", "trust": 1.2 }, { "db": "SECTRACK", "id": "1041451", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "149142", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "148934", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "148916", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "148901", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "148913", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "148941", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "148908", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148946", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148976", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148903", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148897", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148914", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150376", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148936", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148912", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148952", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149143", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149010", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148902", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-133651", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-3620", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148907", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148898", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148899", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150083", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#982149" }, { "db": "VULHUB", "id": "VHN-133651" }, { "db": "VULMON", "id": "CVE-2018-3620" }, { "db": "BID", "id": "105080" }, { "db": "PACKETSTORM", "id": "148941" }, { "db": "PACKETSTORM", "id": "148907" }, { "db": "PACKETSTORM", "id": "148901" }, { "db": "PACKETSTORM", "id": "148898" }, { "db": "PACKETSTORM", "id": "148916" }, { "db": "PACKETSTORM", "id": "148913" }, { "db": "PACKETSTORM", "id": "149142" }, { "db": "PACKETSTORM", "id": "148899" }, { "db": "PACKETSTORM", "id": "148934" }, { "db": "PACKETSTORM", "id": "150083" }, { "db": "NVD", "id": "CVE-2018-3620" } ] }, "id": "VAR-201808-0958", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-133651" } ], "trust": 0.8258663754545454 }, "last_update_date": "2024-11-29T20:39:00.692000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Red Hat: Important: rhev-hypervisor7 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182404 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182603 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182602 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182389 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182388 - Security Advisory" }, { "title": "Red Hat: Important: redhat-virtualization-host security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182403 - Security Advisory" }, { "title": "Red Hat: Important: rhvm-appliance security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182402 - Security Advisory" }, { "title": "Debian Security Advisories: DSA-4279-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=dac4eea76febd76490afc049b9aa11cb" }, { "title": "Debian Security Advisories: DSA-4274-1 xen -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=2129055bb51ebf11b86d56acef7f5da1" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182391 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182392 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182393 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182396 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182387 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3823-1" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182394 - Security Advisory" }, { "title": "Red Hat: CVE-2018-3620", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2018-3620" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2018-3620" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3740-1" }, { "title": "Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3740-2" }, { "title": "Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3741-2" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3741-1" }, { "title": "Ubuntu Security Notice: linux regressions", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3741-3" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182390 - Security Advisory" }, { "title": "Amazon Linux AMI: ALAS-2018-1058", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2018-1058" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3742-1" }, { "title": "Ubuntu Security Notice: linux-lts-trusty vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3742-2" }, { "title": "Ubuntu Security Notice: linux-lts-trusty regressions", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3742-3" }, { "title": "Amazon Linux 2: ALAS2-2018-1058", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2018-1058" }, { "title": "Red Hat: Important: kernel-rt security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182395 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182384 - Security Advisory" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=ba953f0879f87a755234bc0818c99c6d" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=deca5f6210b098f58ce384c28747b82c" }, { "title": "Cisco: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20180814-cpusidechannel" }, { "title": "Huawei Security Advisories: Security Advisory - CPU Side Channel Vulnerability \"L1TF\"", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=28eb43a14c12e8c070afa60d55f86b55" }, { "title": "Citrix Security Bulletins: XenServer Multiple Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=89d06253986d1cdae0f8d9ffbff97d18" }, { "title": "Palo Alto Networks Security Advisory: PAN-SA-2018-0011 Information about L1 Terminal Fault findings", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory\u0026qid=74b853f8cd89b12964ff841924244a71" }, { "title": "https://github.com/houseofxyz/CVE-2020-17382", "trust": 0.1, "url": "https://github.com/houseofxyz/CVE-2020-17382 " }, { "title": "https://github.com/blitz/l1tf-demo", "trust": 0.1, "url": "https://github.com/blitz/l1tf-demo " }, { "title": "Overview\nUsage\nContributing", "trust": 0.1, "url": "https://github.com/microsoft/SpeculationControl " }, { "title": "Overview\nUsage\nContributing", "trust": 0.1, "url": "https://github.com/Microsoft/SpeculationControl " }, { "title": "Livepatch overlay", "trust": 0.1, "url": "https://github.com/aliceinwire/elivepatch-overlay " }, { "title": "Livepatch overlay", "trust": 0.1, "url": "https://github.com/elivepatch/livepatch-overlay " }, { "title": "Network Configuration\nOS-independent", "trust": 0.1, "url": "https://github.com/interlunar/win10-regtweak " }, { "title": "SpecuCheck", "trust": 0.1, "url": "https://github.com/ionescu007/SpecuCheck " }, { "title": "Spectre \u0026 Meltdown Checker", "trust": 0.1, "url": "https://github.com/rosenbergj/cpu-report " }, { "title": "Transient Execution Attack Pot", "trust": 0.1, "url": "https://github.com/github-3rr0r/TEApot " }, { "title": "Transient Execution Attack Pot", "trust": 0.1, "url": "https://github.com/Mashiro1995/TEApot " }, { "title": "cSpeculationControlFixes", "trust": 0.1, "url": "https://github.com/poshsecurity/cSpeculationControlFixes " }, { "title": "meltdown", "trust": 0.1, "url": "https://github.com/timidri/puppet-meltdown " }, { "title": "Spectre \u0026 Meltdown Checker", "trust": 0.1, "url": "https://github.com/edsonjt81/spectre-meltdown " }, { "title": "Spectre \u0026 Meltdown Checker", "trust": 0.1, "url": "https://github.com/merlinepedra25/spectre-meltdown-checker " }, { "title": "Spectre \u0026 Meltdown Checker", "trust": 0.1, "url": "https://github.com/merlinepedra/spectre-meltdown-checker " }, { "title": "Spectre \u0026 Meltdown Checker\nspectre-meltdown-checker\nspectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/kali973/spectre-meltdown-checker " }, { "title": "Spectre \u0026 Meltdown Checker", "trust": 0.1, "url": "https://github.com/kin-cho/my-spectre-meltdown-checker " }, { "title": "Hyperbleed - Current state of spectre-BTI mitigations on cloud", "trust": 0.1, "url": "https://github.com/es0j/hyperbleed " }, { "title": "Spectre \u0026 Meltdown Checker", "trust": 0.1, "url": "https://github.com/speed47/spectre-meltdown-checker " }, { "title": "Hardware and Firmware Security Guidance", "trust": 0.1, "url": "https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance " }, { "title": "Kaosagnt\u0027s Ansible Everyday Utils", "trust": 0.1, "url": "https://github.com/kaosagnt/ansible-everyday " }, { "title": "Hardware attacks / State of the art", "trust": 0.1, "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art " }, { "title": "SecDB - Security Feeds", "trust": 0.1, "url": "https://github.com/giterlizzi/secdb-feeds " }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2018/08/15/foreshadow_sgx_software_attestations_collateral_damage/" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2018/08/14/intel_l1_terminal_fault_bugs/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-3620" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-203", "trust": 1.1 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133651" }, { "db": "NVD", "id": "CVE-2018-3620" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "trust": 2.0, "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "trust": 2.0, "url": "https://foreshadowattack.eu/" }, { "trust": 1.6, "url": "https://www.kb.cert.org/vuls/id/982149" }, { "trust": 1.5, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180814-cpusidechannel" }, { "trust": 1.5, "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "trust": 1.5, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180018" }, { "trust": 1.4, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03874en_us" }, { "trust": 1.3, "url": "https://security.gentoo.org/glsa/201810-06" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2384" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2388" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2390" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2395" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2403" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2404" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2602" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/105080" }, { "trust": 1.2, "url": "http://support.lenovo.com/us/en/solutions/len-24163" }, { "trust": 1.2, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "trust": 1.2, "url": "http://www.vmware.com/security/advisories/vmsa-2018-0021.html" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "trust": 1.2, "url": "https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0" }, { "trust": 1.2, "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0009" }, { "trust": 1.2, "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "trust": 1.2, "url": "https://support.f5.com/csp/article/k95275140" }, { "trust": 1.2, "url": "https://www.synology.com/support/security/synology_sa_18_45" }, { "trust": 1.2, "url": "https://www.debian.org/security/2018/dsa-4274" }, { "trust": 1.2, "url": "https://www.debian.org/security/2018/dsa-4279" }, { "trust": 1.2, "url": "https://security.freebsd.org/advisories/freebsd-sa-18:09.l1tf.asc" }, { "trust": 1.2, "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "trust": 1.2, "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2387" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2389" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2391" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2392" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2393" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2394" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2396" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2402" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2603" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1041451" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3740-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3740-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3741-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3741-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3742-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3742-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3823-1/" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/xrfkqwyv2h4bv75cungcge5tnvqclbgz/" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/v4uwgorqwcencif2bhwuef2odbv75qs2/" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3646" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3620" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2018-3620" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2018-3646" }, { "trust": 0.8, "url": "https://www.usenix.org/conference/usenixsecurity18/presentation/bulck" }, { "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html" }, { "trust": 0.8, "url": "https://www.intel.com/content/dam/www/public/us/en/documents/sa00115-microcode-update-guidance.pdf" }, { "trust": 0.6, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.6, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://access.redhat.com/security/vulnerabilities/l1tf" }, { "trust": 0.5, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5390" }, { "trust": 0.3, "url": "http://www.intel.com/content/www/us/en/homepage.html" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "trust": 0.3, "url": "http://xenbits.xenproject.org/xsa/advisory-289.html" }, { "trust": 0.3, "url": "https://www.synology.com/en-global/support/security/synology_sa_18_45" }, { "trust": 0.3, "url": "https://www.vmware.com/in/security/advisories/vmsa-2018-0020.html" }, { "trust": 0.3, "url": "https://www.vmware.com/in/security/advisories/vmsa-2018-0021.html" }, { "trust": 0.3, "url": "http://xenbits.xenproject.org/xsa/advisory-289.txt" }, { "trust": 0.3, "url": "https://support.citrix.com/article/ctx236548" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-5390" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-7566" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7566" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-3693" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3693" }, { "trust": 0.3, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/l1tf" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13215" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-13215" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10675" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-10675" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5391" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03874en_us" }, { "trust": 0.1, "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/xrfkqwyv2h4bv75cungcge5tnvqclbgz/" }, { "trust": 0.1, "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/v4uwgorqwcencif2bhwuef2odbv75qs2/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/203.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/blitz/l1tf-demo" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/2974891" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15265" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-15265" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1000004" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-0861" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-0861" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10901" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000004" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10901" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1027.30" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3741-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-133.159~14.04.1" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3741-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1017.18~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-32.35~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1021.21~16.04.1" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3740-2" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3740-1" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/3527791" }, { "trust": 0.1, "url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5244" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7542" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12892" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10471" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12891" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5753" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12893" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10982" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15469" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10472" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5754" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10981" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5715" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15468" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15470" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7541" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7540" } ], "sources": [ { "db": "CERT/CC", "id": "VU#982149" }, { "db": "VULHUB", "id": "VHN-133651" }, { "db": "VULMON", "id": "CVE-2018-3620" }, { "db": "BID", "id": "105080" }, { "db": "PACKETSTORM", "id": "148941" }, { "db": "PACKETSTORM", "id": "148907" }, { "db": "PACKETSTORM", "id": "148901" }, { "db": "PACKETSTORM", "id": "148898" }, { "db": "PACKETSTORM", "id": "148916" }, { "db": "PACKETSTORM", "id": "148913" }, { "db": "PACKETSTORM", "id": "149142" }, { "db": "PACKETSTORM", "id": "148899" }, { "db": "PACKETSTORM", "id": "148934" }, { "db": "PACKETSTORM", "id": "150083" }, { "db": "NVD", "id": "CVE-2018-3620" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#982149" }, { "db": "VULHUB", "id": "VHN-133651" }, { "db": "VULMON", "id": "CVE-2018-3620" }, { "db": "BID", "id": "105080" }, { "db": "PACKETSTORM", "id": "148941" }, { "db": "PACKETSTORM", "id": "148907" }, { "db": "PACKETSTORM", "id": "148901" }, { "db": "PACKETSTORM", "id": "148898" }, { "db": "PACKETSTORM", "id": "148916" }, { "db": "PACKETSTORM", "id": "148913" }, { "db": "PACKETSTORM", "id": "149142" }, { "db": "PACKETSTORM", "id": "148899" }, { "db": "PACKETSTORM", "id": "148934" }, { "db": "PACKETSTORM", "id": "150083" }, { "db": "NVD", "id": "CVE-2018-3620" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-15T00:00:00", "db": "CERT/CC", "id": "VU#982149" }, { "date": "2018-08-14T00:00:00", "db": "VULHUB", "id": "VHN-133651" }, { "date": "2018-08-14T00:00:00", "db": "VULMON", "id": "CVE-2018-3620" }, { "date": "2018-08-14T00:00:00", "db": "BID", "id": "105080" }, { "date": "2018-08-15T17:16:28", "db": "PACKETSTORM", "id": "148941" }, { "date": "2018-08-15T04:40:44", "db": "PACKETSTORM", "id": "148907" }, { "date": "2018-08-15T04:37:56", "db": "PACKETSTORM", "id": "148901" }, { "date": "2018-08-15T04:37:29", "db": "PACKETSTORM", "id": "148898" }, { "date": "2018-08-15T04:42:57", "db": "PACKETSTORM", "id": "148916" }, { "date": "2018-08-15T04:42:40", "db": "PACKETSTORM", "id": "148913" }, { "date": "2018-08-30T23:36:28", "db": "PACKETSTORM", "id": "149142" }, { "date": "2018-08-15T04:37:37", "db": "PACKETSTORM", "id": "148899" }, { "date": "2018-08-14T19:02:22", "db": "PACKETSTORM", "id": "148934" }, { "date": "2018-10-31T01:14:40", "db": "PACKETSTORM", "id": "150083" }, { "date": "2018-08-14T19:29:00.793000", "db": "NVD", "id": "CVE-2018-3620" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-10T00:00:00", "db": "CERT/CC", "id": "VU#982149" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-133651" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2018-3620" }, { "date": "2019-01-24T11:00:00", "db": "BID", "id": "105080" }, { "date": "2024-11-21T04:05:47.007000", "db": "NVD", "id": "CVE-2018-3620" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "105080" }, { "db": "PACKETSTORM", "id": "148916" }, { "db": "PACKETSTORM", "id": "148913" } ], "trust": 0.5 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)", "sources": [ { "db": "CERT/CC", "id": "VU#982149" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "105080" } ], "trust": 0.3 } }
var-201906-0921
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A race condition issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0921", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0178" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "cve": "CVE-2019-0178", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2019-0178", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-140209", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 3.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.0, "id": "CVE-2019-0178", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0178", "trust": 1.0, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201906-568", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-140209", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140209" }, { "db": "CNNVD", "id": "CNNVD-201906-568" }, { "db": "NVD", "id": "CVE-2019-0178" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A race condition issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-0178" }, { "db": "VULHUB", "id": "VHN-140209" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0178", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-568", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140209", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140209" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-568" }, { "db": "NVD", "id": "CVE-2019-0178" } ] }, "id": "VAR-201906-0921", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140209" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T19:37:51.522000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.0 }, { "problemtype": "CWE-362", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140209" }, { "db": "NVD", "id": "CVE-2019-0178" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140209" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-568" }, { "db": "NVD", "id": "CVE-2019-0178" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140209" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-568" }, { "db": "NVD", "id": "CVE-2019-0178" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140209" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-568" }, { "date": "2019-06-13T16:29:01.013000", "db": "NVD", "id": "CVE-2019-0178" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-140209" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-568" }, { "date": "2024-11-21T04:16:25.043000", "db": "NVD", "id": "CVE-2019-0178" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-568" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-568" } ], "trust": 0.6 } }
var-201906-0925
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. WordPress for FooGallery The plugin contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A path traversal vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0925", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "foogallery", "scope": "eq", "trust": 0.8, "vendor": "fooplugins", "version": "1.8.12" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "NVD", "id": "CVE-2019-0182" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "cve": "CVE-2019-0182", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-0182", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.5, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-0182", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140213", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2019-0182", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.8, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-0182", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0182", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2019-0182", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201906-571", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-140213", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2019-0182", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140213" }, { "db": "VULMON", "id": "CVE-2019-0182" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "CNNVD", "id": "CNNVD-201906-571" }, { "db": "NVD", "id": "CVE-2019-0182" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. WordPress for FooGallery The plugin contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A path traversal vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-0182" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "VULHUB", "id": "VHN-140213" }, { "db": "VULMON", "id": "CVE-2019-0182" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0182", "trust": 3.4 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-014034", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-571", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140213", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-0182", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140213" }, { "db": "VULMON", "id": "CVE-2019-0182" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "CNNVD", "id": "CNNVD-201906-571" }, { "db": "NVD", "id": "CVE-2019-0182" } ] }, "id": "VAR-201906-0925", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140213" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T20:47:37.919000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "FooGallery - Image Gallery WordPress Plugin", "trust": 0.8, "url": "https://wordpress.org/plugins/foogallery/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-79", "trust": 0.8 }, { "problemtype": "CWE-22", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140213" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "NVD", "id": "CVE-2019-0182" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-20182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20182" }, { "trust": 0.8, "url": "https://medium.com/@pablo0xsantiago/cve-2019-20182-foogallery-image-gallery-wordpress-plugin-1-8-12-stored-cross-site-scripting-d5864f1259f" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/522.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140213" }, { "db": "VULMON", "id": "CVE-2019-0182" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "CNNVD", "id": "CNNVD-201906-571" }, { "db": "NVD", "id": "CVE-2019-0182" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140213" }, { "db": "VULMON", "id": "CVE-2019-0182" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "CNNVD", "id": "CNNVD-201906-571" }, { "db": "NVD", "id": "CVE-2019-0182" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140213" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-0182" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-571" }, { "date": "2019-06-13T16:29:01.187000", "db": "NVD", "id": "CVE-2019-0182" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-03T00:00:00", "db": "VULHUB", "id": "VHN-140213" }, { "date": "2020-08-24T00:00:00", "db": "VULMON", "id": "CVE-2019-0182" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-571" }, { "date": "2024-11-21T04:16:25.507000", "db": "NVD", "id": "CVE-2019-0182" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-571" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-571" } ], "trust": 0.6 } }
var-201906-1232
Vulnerability from variot
Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1232", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11125" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-550" } ], "trust": 0.6 }, "cve": "CVE-2019-11125", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11125", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142740", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-11125", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-11125", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-550", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142740", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11125", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142740" }, { "db": "VULMON", "id": "CVE-2019-11125" }, { "db": "CNNVD", "id": "CNNVD-201906-550" }, { "db": "NVD", "id": "CVE-2019-11125" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2019-11125" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142740" }, { "db": "VULMON", "id": "CVE-2019-11125" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11125", "trust": 2.9 }, { "db": "BID", "id": "108766", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-550", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142740", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11125", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142740" }, { "db": "VULMON", "id": "CVE-2019-11125" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-550" }, { "db": "NVD", "id": "CVE-2019-11125" } ] }, "id": "VAR-201906-1232", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142740" } ], "trust": 0.8407131071428573 }, "last_update_date": "2024-11-23T19:26:47.351000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel NUC Kit Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93783" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11125" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-550" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142740" }, { "db": "NVD", "id": "CVE-2019-11125" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142740" }, { "db": "VULMON", "id": "CVE-2019-11125" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-550" }, { "db": "NVD", "id": "CVE-2019-11125" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142740" }, { "db": "VULMON", "id": "CVE-2019-11125" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-550" }, { "db": "NVD", "id": "CVE-2019-11125" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142740" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11125" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-550" }, { "date": "2019-06-13T16:29:01.420000", "db": "NVD", "id": "CVE-2019-11125" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142740" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11125" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-550" }, { "date": "2024-11-21T04:20:34.643000", "db": "NVD", "id": "CVE-2019-11125" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-550" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-550" } ], "trust": 0.6 } }
var-201906-0918
Vulnerability from variot
Logic condition in specific microprocessors may allow an authenticated user to potentially enable partial physical address information disclosure via local access. Intel CoreX-seriesProcessors and so on are products of Intel Corporation of the United States. Intel CoreX-seriesProcessors is an X-Series central processing unit (CPU). 4thGenerationIntelCorei5Processors is a fourth-generation Corei5 series central processing unit (CPU). 4thGenerationIntelCorei3Processors is a fourth-generation Corei3 series central processing unit (CPU). There are information disclosure vulnerabilities in various Intel products that can be exploited by local attackers to disclose some physical addresses. DRAM is prone to an information disclosure vulnerability. The following products and versions are affected: Intel Core X-series Processors; 4th Generation Intel Core i5 Processors; 4th Generation Intel Core i3 Processors; Intel Pentium Processor G Series; Intel Pentium Processor 3000 Series; Intel Celeron Processor 2000 Series; Intel Xeon Processor E7 v3 Family; Intel Xeon Processor E5 v3 Family; Intel Xeon Processor E3 v3 Family
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0918", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "i5-4330m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4158u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4130t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2603", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-9960x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4025u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1281", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3805u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4160", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4102e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4430s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4110e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4667", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2630l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4330te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4310m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4350", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8867", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2418l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2690", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1241", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2658a", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4370t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2002e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1285l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4210h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4330t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4422e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1240l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4288u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4202y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4460", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4030y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4112e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4200y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2980u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3550m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4440s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4402ec", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i7-7800x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4300u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2950m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-9920x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1268l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4110m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4100u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4402e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3556u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8880", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2687w", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1285", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4200h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4370", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-7920x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4278u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8860", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4150t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4005u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2658", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4400e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2697", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1276", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-7940x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4460s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4170", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1220l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2628l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4100m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-4809", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4460t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4340", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1226", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1286l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2650l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-9940x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-4820", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1275l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4302y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-7900x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3561y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4655", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3825u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4170t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2618l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2699", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-4830", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2623", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2609", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1265l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1246", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8880l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2670", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4669", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1680", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4648", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4150", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4610", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4010u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4220y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2438l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2683", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4360", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4020y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4360t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2981u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8870", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i7-7820x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-9900x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2000e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2648l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3560y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4360u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4410e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4350t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2643", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4308u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1231", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2408l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4160t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2970m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1271", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4258u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3558u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-7960x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-7980xe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2608l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1286", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4012y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4210m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4120u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2955u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2957u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4030u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2961y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8891", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8893", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4340m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4130", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4627", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4200m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2698", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2695", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4330", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4310u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4300m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-4850", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2637", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2680", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4000m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8890", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3560m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1230l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-9980xe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2667", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4250u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4340te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4300y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4010y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4350u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4260u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "core x-series processors", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "4th generation intel core i5 processors", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "4th generation intel core i3 processors", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "pentium processor g series", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "pentium processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "3000" }, { "model": "celeron processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "2000" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "pentium processor g series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "pentium processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "30000" }, { "model": "core series processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "x0" }, { "model": "celeron processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "20000" }, { "model": "4th generation core i5 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "4th generation core i3 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "dram", "scope": "eq", "trust": 0.3, "vendor": "dram", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "BID", "id": "108731" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0174" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Andrew Kwong and Daniel Genkin from University of Michigan. Daniel Gruss from Graz University of Technology. Yuval Yarom from University of Adelaide.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-527" } ], "trust": 0.6 }, "cve": "CVE-2019-0174", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-0174", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2019-25499", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140205", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2019-0174", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0174", "trust": 1.0, "value": "LOW" }, { "author": "CNVD", "id": "CNVD-2019-25499", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201906-527", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-140205", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "VULHUB", "id": "VHN-140205" }, { "db": "CNNVD", "id": "CNNVD-201906-527" }, { "db": "NVD", "id": "CVE-2019-0174" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Logic condition in specific microprocessors may allow an authenticated user to potentially enable partial physical address information disclosure via local access. Intel CoreX-seriesProcessors and so on are products of Intel Corporation of the United States. Intel CoreX-seriesProcessors is an X-Series central processing unit (CPU). 4thGenerationIntelCorei5Processors is a fourth-generation Corei5 series central processing unit (CPU). 4thGenerationIntelCorei3Processors is a fourth-generation Corei3 series central processing unit (CPU). There are information disclosure vulnerabilities in various Intel products that can be exploited by local attackers to disclose some physical addresses. DRAM is prone to an information disclosure vulnerability. The following products and versions are affected: Intel Core X-series Processors; 4th Generation Intel Core i5 Processors; 4th Generation Intel Core i3 Processors; Intel Pentium Processor G Series; Intel Pentium Processor 3000 Series; Intel Celeron Processor 2000 Series; Intel Xeon Processor E7 v3 Family; Intel Xeon Processor E5 v3 Family; Intel Xeon Processor E3 v3 Family", "sources": [ { "db": "NVD", "id": "CVE-2019-0174" }, { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "BID", "id": "108731" }, { "db": "VULHUB", "id": "VHN-140205" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0174", "trust": 3.4 }, { "db": "BID", "id": "108731", "trust": 2.6 }, { "db": "LENOVO", "id": "LEN-27842", "trust": 2.3 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-527", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25499", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-140205", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "VULHUB", "id": "VHN-140205" }, { "db": "BID", "id": "108731" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-527" }, { "db": "NVD", "id": "CVE-2019-0174" } ] }, "id": "VAR-201906-0918", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "VULHUB", "id": "VHN-140205" } ], "trust": 1.4053239057142857 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" } ] }, "last_update_date": "2024-11-23T20:32:19.224000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140205" }, { "db": "NVD", "id": "CVE-2019-0174" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.securityfocus.com/bid/108731" }, { "trust": 2.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "trust": 2.3, "url": "https://security.netapp.com/advisory/ntap-20190612-0001/" }, { "trust": 1.7, "url": "https://support.f5.com/csp/article/k18165180" }, { "trust": 1.7, "url": "https://support.lenovo.com/us/en/product_security/len-27842" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 1.2, "url": "https://support.lenovo.com/us/zh/product_security/len-27842" }, { "trust": 0.9, "url": "https://rambleed.com/docs/20190603-rambleed-web.pdf" }, { "trust": 0.9, "url": "https://blogs.oracle.com/security/rambleed" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "VULHUB", "id": "VHN-140205" }, { "db": "BID", "id": "108731" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-527" }, { "db": "NVD", "id": "CVE-2019-0174" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "VULHUB", "id": "VHN-140205" }, { "db": "BID", "id": "108731" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-527" }, { "db": "NVD", "id": "CVE-2019-0174" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25499" }, { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140205" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108731" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-527" }, { "date": "2019-06-13T16:29:00.887000", "db": "NVD", "id": "CVE-2019-0174" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25499" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-140205" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108731" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-527" }, { "date": "2024-11-21T04:16:24.493000", "db": "NVD", "id": "CVE-2019-0174" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108731" }, { "db": "CNNVD", "id": "CNNVD-201906-527" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-527" } ], "trust": 0.6 } }
var-201906-0919
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel OpenAttestation is an open source project of Intel Corporation for managing host integrity verification using the remote attestation protocol defined by TCG. A permissions and access control issue vulnerability exists in the authentication process in Intel OpenAttestation due to the program's failure to adequately authenticate sessions. A local attacker could exploit this vulnerability to elevate privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0919", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0175" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "cve": "CVE-2019-0175", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-0175", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140206", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2019-0175", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0175", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-569", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140206", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140206" }, { "db": "CNNVD", "id": "CNNVD-201906-569" }, { "db": "NVD", "id": "CVE-2019-0175" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel OpenAttestation is an open source project of Intel Corporation for managing host integrity verification using the remote attestation protocol defined by TCG. A permissions and access control issue vulnerability exists in the authentication process in Intel OpenAttestation due to the program\u0027s failure to adequately authenticate sessions. A local attacker could exploit this vulnerability to elevate privileges", "sources": [ { "db": "NVD", "id": "CVE-2019-0175" }, { "db": "VULHUB", "id": "VHN-140206" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0175", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-569", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140206", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140206" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-569" }, { "db": "NVD", "id": "CVE-2019-0175" } ] }, "id": "VAR-201906-0919", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140206" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T20:45:00.971000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-264", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140206" }, { "db": "NVD", "id": "CVE-2019-0175" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140206" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-569" }, { "db": "NVD", "id": "CVE-2019-0175" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140206" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-569" }, { "db": "NVD", "id": "CVE-2019-0175" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140206" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-569" }, { "date": "2019-06-13T16:29:00.937000", "db": "NVD", "id": "CVE-2019-0175" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140206" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-569" }, { "date": "2024-11-21T04:16:24.787000", "db": "NVD", "id": "CVE-2019-0175" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-569" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-569" } ], "trust": 0.6 } }
var-201906-1230
Vulnerability from variot
Insufficient session validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1230", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kits", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11123" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-549" } ], "trust": 0.6 }, "cve": "CVE-2019-11123", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11123", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2019-25503", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142738", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-11123", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-11123", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-25503", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-549", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142738", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11123", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULHUB", "id": "VHN-142738" }, { "db": "VULMON", "id": "CVE-2019-11123" }, { "db": "CNNVD", "id": "CNNVD-201906-549" }, { "db": "NVD", "id": "CVE-2019-11123" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient session validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2019-11123" }, { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142738" }, { "db": "VULMON", "id": "CVE-2019-11123" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11123", "trust": 3.5 }, { "db": "BID", "id": "108766", "trust": 2.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-549", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25503", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142738", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11123", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULHUB", "id": "VHN-142738" }, { "db": "VULMON", "id": "CVE-2019-11123" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-549" }, { "db": "NVD", "id": "CVE-2019-11123" } ] }, "id": "VAR-201906-1230", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULHUB", "id": "VHN-142738" } ], "trust": 1.4411795225000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" } ] }, "last_update_date": "2024-11-23T21:12:00.358000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "IntelNUCKit enters a patch to verify the error vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/172811" }, { "title": "Intel NUC Kit Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93782" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULMON", "id": "CVE-2019-11123" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-549" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142738" }, { "db": "NVD", "id": "CVE-2019-11123" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 2.3, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULHUB", "id": "VHN-142738" }, { "db": "VULMON", "id": "CVE-2019-11123" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-549" }, { "db": "NVD", "id": "CVE-2019-11123" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULHUB", "id": "VHN-142738" }, { "db": "VULMON", "id": "CVE-2019-11123" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-549" }, { "db": "NVD", "id": "CVE-2019-11123" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25503" }, { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142738" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11123" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-549" }, { "date": "2019-06-13T16:29:01.357000", "db": "NVD", "id": "CVE-2019-11123" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25503" }, { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142738" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11123" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-549" }, { "date": "2024-11-21T04:20:34.400000", "db": "NVD", "id": "CVE-2019-11123" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-549" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel NUC Kit Input Validation Error Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "CNNVD", "id": "CNNVD-201906-549" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-549" } ], "trust": 0.6 } }
var-201906-1233
Vulnerability from variot
Pointer corruption in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1233", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kits", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11126" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-551" } ], "trust": 0.6 }, "cve": "CVE-2019-11126", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11126", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2019-25502", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142741", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-11126", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-11126", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-25502", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-551", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142741", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11126", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULHUB", "id": "VHN-142741" }, { "db": "VULMON", "id": "CVE-2019-11126" }, { "db": "CNNVD", "id": "CNNVD-201906-551" }, { "db": "NVD", "id": "CVE-2019-11126" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Pointer corruption in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2019-11126" }, { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142741" }, { "db": "VULMON", "id": "CVE-2019-11126" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11126", "trust": 3.5 }, { "db": "BID", "id": "108766", "trust": 2.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-551", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25502", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142741", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11126", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULHUB", "id": "VHN-142741" }, { "db": "VULMON", "id": "CVE-2019-11126" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-551" }, { "db": "NVD", "id": "CVE-2019-11126" } ] }, "id": "VAR-201906-1233", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULHUB", "id": "VHN-142741" } ], "trust": 1.4411795225000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" } ] }, "last_update_date": "2024-11-23T19:38:26.255000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Patch for IntelNUCKit Buffer Overflow Vulnerability (CNVD-2019-25502)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/172809" }, { "title": "Intel NUC Kit Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93784" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULMON", "id": "CVE-2019-11126" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-551" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142741" }, { "db": "NVD", "id": "CVE-2019-11126" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 2.3, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULHUB", "id": "VHN-142741" }, { "db": "VULMON", "id": "CVE-2019-11126" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-551" }, { "db": "NVD", "id": "CVE-2019-11126" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULHUB", "id": "VHN-142741" }, { "db": "VULMON", "id": "CVE-2019-11126" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-551" }, { "db": "NVD", "id": "CVE-2019-11126" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25502" }, { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142741" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11126" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-551" }, { "date": "2019-06-13T16:29:01.467000", "db": "NVD", "id": "CVE-2019-11126" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25502" }, { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142741" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11126" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-551" }, { "date": "2024-11-21T04:20:34.760000", "db": "NVD", "id": "CVE-2019-11126" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-551" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-551" } ], "trust": 0.6 } }
var-201906-0924
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Both Intel Open Cloud Integrity Technology (CIT) and Intel OpenAttestation are products of Intel Corporation. Intel Open Cloud Integrity Technology is a set of solutions for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. Intel OpenAttestation is an open source project for managing host integrity verification using the remote attestation protocol defined by the TCG. Input validation error vulnerabilities exist in Intel Open CIT and OpenAttestation. A local attacker could exploit this vulnerability to elevate privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0924", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0181" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "cve": "CVE-2019-0181", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-0181", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140212", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-0181", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0181", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-570", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140212", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140212" }, { "db": "CNNVD", "id": "CNNVD-201906-570" }, { "db": "NVD", "id": "CVE-2019-0181" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Both Intel Open Cloud Integrity Technology (CIT) and Intel OpenAttestation are products of Intel Corporation. Intel Open Cloud Integrity Technology is a set of solutions for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. Intel OpenAttestation is an open source project for managing host integrity verification using the remote attestation protocol defined by the TCG. Input validation error vulnerabilities exist in Intel Open CIT and OpenAttestation. A local attacker could exploit this vulnerability to elevate privileges", "sources": [ { "db": "NVD", "id": "CVE-2019-0181" }, { "db": "VULHUB", "id": "VHN-140212" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0181", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-570", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140212", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140212" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-570" }, { "db": "NVD", "id": "CVE-2019-0181" } ] }, "id": "VAR-201906-0924", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140212" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T20:05:19.426000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140212" }, { "db": "NVD", "id": "CVE-2019-0181" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140212" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-570" }, { "db": "NVD", "id": "CVE-2019-0181" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140212" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-570" }, { "db": "NVD", "id": "CVE-2019-0181" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140212" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-570" }, { "date": "2019-06-13T16:29:01.137000", "db": "NVD", "id": "CVE-2019-0181" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140212" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-570" }, { "date": "2024-11-21T04:16:25.380000", "db": "NVD", "id": "CVE-2019-0181" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-570" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-570" } ], "trust": 0.6 } }
var-201801-1711
Vulnerability from variot
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Spectre vulnerability exists in the CPU processor core. Because Intel does not separate low-privileged applications from accessing kernel memory, an attacker can use a malicious application to obtain private data that should be quarantined. Intel and ARM CPU chips have an information disclosure vulnerability, which originates from a flaw in the processor data boundary mechanism. The following products and versions are affected: ARM Cortex-A75; Intel Xeon E5-1650 v3, v2, v4; Xeon E3-1265l v2, v3, v4; Xeon E3-1245 v2, v3, v5, v6; Xeon X7542 wait. If not, head over to https://meltdownattack.com/ and get an overview. https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
The FreeBSD Security Team was notified of the issue in late December and received a briefing under NDA with the original embargo date of January 9th. Since we received relatively late notice of the issue, our ability to provide fixes is delayed.
Meltdown (CVE-2017-5754) ~~~~~~~~~~~~~~~~~~~~~~~~ In terms of priority, the first step is to mitigate against the Meltdown attack (CVE-2017-5754, cited as variant 3 by Project Zero). Work for this is ongoing, but due to the relatively large changes needed, this is going to take a little while. We are currently targeting patches for amd64 being dev complete this week with testing probably running into next week. From there, we hope to give it a short bake time before pushing it into the 11.1-RELEASE branch. Additional work will be required to bring the mitigation to 10.3-RELEASE and 10.4-RELEASE.
The code will be selectable via a tunable which will automatically turn on for modern Intel processors and off for AMD processors (since they are reportedly not vulnerable). Since the fix for Meltdown does incur a performance hit for any transition between user space and kernel space, this could be rather impactful depending on the workload. As such, the tunable can also be overridden by the end-user if they are willing to accept the risk.
Initial work can be tracked at https://reviews.freebsd.org/D13797. Please note this is a work in progress and some stuff is likely to be broken.
Spectre (CVE-2017-5753 and CVE-2017-5715) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ When it comes to the Spectre vulnerabilities, it is much harder to sort these out. Variant 1 (CVE-2017-5753) is going to require some static analysis to determine vulnerable use cases that will require barriers to stop speculation from disclosing information it shouldn't. While we haven't done the analysis to determine where we are vulnerable, the number of cases here are supposed to be pretty small. Apparently there have been some Coverity rules developed to help look for these, but we are still evaluating what can be done here.
The other half of Spectre, variant 2 (CVE-2017-5715) is a bit trickier as it affects both normal processes and bhyve. There is a proposed patch for LLVM (https://reviews.llvm.org/D41723) that introduces a concept called 'retpoline' which mitigates this issue. We are likely to pull this into HEAD and 11-STABLE once it hits the LLVM tree. Unfortunately, the currently supported FreeBSD releases are using older versions of LLVM for which we are not sure the LLVM project will produce patches. We will be looking at the feasibility to backport these patches to these earlier versions.
There are CPU microcode fixes coming out when in concert with OS changes would also help, but that's a bit down the road at the moment.
Best regards, Gordon Tetlow with security-officer hat on . On i386 and amd64 architectures, the IBRS and IBPB features are required to enable the kernel mitigations. Ubuntu is working with Intel and AMD to provide future microcode updates that implement IBRS and IBPB as they are made available. Ubuntu users with a processor from a different vendor should contact the vendor to identify necessary firmware updates. Ubuntu will provide corresponding QEMU updates in the future for users of self-hosted virtual environments in coordination with upstream QEMU. Ubuntu users in cloud environments should contact the cloud provider to confirm that the hypervisor has been updated to expose the new CPU features to virtual machines. X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 04 Jan 2018 01:01:01 +0000 (UTC)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: kernel security update Advisory ID: RHSA-2018:0008-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:0008 Issue date: 2018-01-03 =====================================================================
- Summary:
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
Security Fix(es):
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.
Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty.
Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)
Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)
Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.
Red Hat would like to thank Google Project Zero for reporting these issues.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass 1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection 1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: kernel-2.6.32-696.18.7.el6.src.rpm
i386: kernel-2.6.32-696.18.7.el6.i686.rpm kernel-debug-2.6.32-696.18.7.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm kernel-devel-2.6.32-696.18.7.el6.i686.rpm kernel-headers-2.6.32-696.18.7.el6.i686.rpm perf-2.6.32-696.18.7.el6.i686.rpm perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
noarch: kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm kernel-doc-2.6.32-696.18.7.el6.noarch.rpm kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
x86_64: kernel-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm perf-2.6.32-696.18.7.el6.x86_64.rpm perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm python-perf-2.6.32-696.18.7.el6.i686.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
x86_64: kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm python-perf-2.6.32-696.18.7.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: kernel-2.6.32-696.18.7.el6.src.rpm
noarch: kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm kernel-doc-2.6.32-696.18.7.el6.noarch.rpm kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
x86_64: kernel-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm perf-2.6.32-696.18.7.el6.x86_64.rpm perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm python-perf-2.6.32-696.18.7.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: kernel-2.6.32-696.18.7.el6.src.rpm
i386: kernel-2.6.32-696.18.7.el6.i686.rpm kernel-debug-2.6.32-696.18.7.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm kernel-devel-2.6.32-696.18.7.el6.i686.rpm kernel-headers-2.6.32-696.18.7.el6.i686.rpm perf-2.6.32-696.18.7.el6.i686.rpm perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
noarch: kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm kernel-doc-2.6.32-696.18.7.el6.noarch.rpm kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
ppc64: kernel-2.6.32-696.18.7.el6.ppc64.rpm kernel-bootwrapper-2.6.32-696.18.7.el6.ppc64.rpm kernel-debug-2.6.32-696.18.7.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm kernel-debug-devel-2.6.32-696.18.7.el6.ppc64.rpm kernel-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-696.18.7.el6.ppc64.rpm kernel-devel-2.6.32-696.18.7.el6.ppc64.rpm kernel-headers-2.6.32-696.18.7.el6.ppc64.rpm perf-2.6.32-696.18.7.el6.ppc64.rpm perf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm
s390x: kernel-2.6.32-696.18.7.el6.s390x.rpm kernel-debug-2.6.32-696.18.7.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.s390x.rpm kernel-debug-devel-2.6.32-696.18.7.el6.s390x.rpm kernel-debuginfo-2.6.32-696.18.7.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-696.18.7.el6.s390x.rpm kernel-devel-2.6.32-696.18.7.el6.s390x.rpm kernel-headers-2.6.32-696.18.7.el6.s390x.rpm kernel-kdump-2.6.32-696.18.7.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-696.18.7.el6.s390x.rpm kernel-kdump-devel-2.6.32-696.18.7.el6.s390x.rpm perf-2.6.32-696.18.7.el6.s390x.rpm perf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
x86_64: kernel-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm perf-2.6.32-696.18.7.el6.x86_64.rpm perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm python-perf-2.6.32-696.18.7.el6.i686.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
ppc64: kernel-debug-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm kernel-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-696.18.7.el6.ppc64.rpm perf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm python-perf-2.6.32-696.18.7.el6.ppc64.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm
s390x: kernel-debug-debuginfo-2.6.32-696.18.7.el6.s390x.rpm kernel-debuginfo-2.6.32-696.18.7.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-696.18.7.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-696.18.7.el6.s390x.rpm perf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm python-perf-2.6.32-696.18.7.el6.s390x.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
x86_64: kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm python-perf-2.6.32-696.18.7.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: kernel-2.6.32-696.18.7.el6.src.rpm
i386: kernel-2.6.32-696.18.7.el6.i686.rpm kernel-debug-2.6.32-696.18.7.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm kernel-devel-2.6.32-696.18.7.el6.i686.rpm kernel-headers-2.6.32-696.18.7.el6.i686.rpm perf-2.6.32-696.18.7.el6.i686.rpm perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
noarch: kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm kernel-doc-2.6.32-696.18.7.el6.noarch.rpm kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
x86_64: kernel-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm perf-2.6.32-696.18.7.el6.x86_64.rpm perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm python-perf-2.6.32-696.18.7.el6.i686.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
x86_64: kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm python-perf-2.6.32-696.18.7.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFaTXwuXlSAg2UNWIIRAp3LAKCNdSqjVu7zsXcUTnpGuuQAuUlTpwCfTE/O OR+iGnoY+cALbsBWKwbmzQM= =V4ow -----END PGP SIGNATURE-----
-- RHSA-announce mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhsa-announce .
Security Fix(es):
-
hw: cpu: speculative execution permission faults handling (CVE-2017-5754)
-
Kernel: error in exception handling leads to DoS (CVE-2018-8897)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1554251)
-
6.5) - x86_64
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
============================================================================= FreeBSD-SA-18:03.speculative_execution Security Advisory The FreeBSD Project
Topic: Speculative Execution Vulnerabilities
Category: core Module: kernel Announced: 2018-03-14 Credits: Jann Horn (Google Project Zero); Werner Haas, Thomas Prescher (Cyberus Technology); Daniel Gruss, Moritz Lipp, Stefan Mangard, Michael Schwarz (Graz University of Technology); Paul Kocher; Daniel Genkin (University of Pennsylvania and University of Maryland), Mike Hamburg (Rambus); Yuval Yarom (University of Adelaide and Data6) Affects: All supported versions of FreeBSD. Corrected: 2018-02-17 18:00:01 UTC (stable/11, 11.1-STABLE) 2018-03-14 04:00:00 UTC (releng/11.1, 11.1-RELEASE-p8) CVE Name: CVE-2017-5715, CVE-2017-5754
Special Note: Speculative execution vulnerability mitigation is a work in progress. This advisory addresses the most significant issues for FreeBSD 11.1 on amd64 CPUs. We expect to update this advisory to include 10.x for amd64 CPUs. Future FreeBSD releases will address this issue on i386 and other CPUs. freebsd-update will include changes on i386 as part of this update due to common code changes shared between amd64 and i386, however it contains no functional changes for i386 (in particular, it does not mitigate the issue on i386).
For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .
II. Problem Description
A number of issues relating to speculative execution were found last year and publicly announced January 3rd. Two of these, known as Meltdown and Spectre V2, are addressed here.
CVE-2017-5754 (Meltdown)
This issue relies on an affected CPU speculatively executing instructions beyond a faulting instruction. When this happens, changes to architectural state are not committed, but observable changes may be left in micro- architectural state (for example, cache). This may be used to infer privileged data.
CVE-2017-5715 (Spectre V2)
Spectre V2 uses branch target injection to speculatively execute kernel code at an address under the control of an attacker.
III. Impact
An attacker may be able to read secret data from the kernel or from a process when executing untrusted code (for example, in a web browser).
IV. Workaround
No workaround is available.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date, and reboot.
2) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility, followed by a reboot into the new kernel:
freebsd-update fetch
freebsd-update install
shutdown -r now
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
[FreeBSD 11.1]
fetch https://security.FreeBSD.org/patches/SA-18:03/speculative_execution-amd64-11.patch
fetch https://security.FreeBSD.org/patches/SA-18:03/speculative_execution-amd64-11.patch.asc
gpg --verify speculative_execution-amd64-11.patch.asc
b) Apply the patch. Execute the following commands as root:
cd /usr/src
patch < /path/to/patch
c) Recompile your kernel as described in and reboot the system.
VI. Correction details
CVE-2017-5754 (Meltdown)
The mitigation is known as Page Table Isolation (PTI). PTI largely separates kernel and user mode page tables, so that even during speculative execution most of the kernel's data is unmapped and not accessible. A positive result is definitive (that is, the vulnerability exists with certainty). A negative result indicates either that the CPU is not affected, or that the test is not capable of demonstrating the issue on the CPU (and may need to be modified).
A patched kernel will automatically enable PTI on Intel CPUs. The status can be checked via the vm.pmap.pti sysctl:
sysctl vm.pmap.pti
vm.pmap.pti: 1
The default setting can be overridden by setting the loader tunable vm.pmap.pti to 1 or 0 in /boot/loader.conf. This setting takes effect only at boot.
PTI introduces a performance regression. The observed performance loss is significant in microbenchmarks of system call overhead, but is much smaller for many real workloads.
CVE-2017-5715 (Spectre V2)
There are two common mitigations for Spectre V2. This patch includes a mitigation using Indirect Branch Restricted Speculation, a feature available via a microcode update from processor manufacturers. The alternate mitigation, Retpoline, is a feature available in newer compilers. The feasibility of applying Retpoline to stable branches and/or releases is under investigation.
The patch includes the IBRS mitigation for Spectre V2. To use the mitigation the system must have an updated microcode; with older microcode a patched kernel will function without the mitigation.
IBRS can be disabled via the hw.ibrs_disable sysctl (and tunable), and the status can be checked via the hw.ibrs_active sysctl. IBRS may be enabled or disabled at runtime. Additional detail on microcode updates will follow.
The following list contains the correction revision numbers for each affected branch.
Branch/path Revision
stable/11/ r329462 releng/11.1/ r330908
To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:
svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
VII. 7) - noarch, x86_64
- Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03805en_us Version: 7
HPESBHF03805 rev.7 - Certain HPE products using Microprocessors from Intel, AMD, and ARM, with Speculative Execution, Elevation of Privilege and Information Disclosure.
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2018-01-23 Last Updated: 2018-01-22
Potential Security Impact: Local: Disclosure of Information, Elevation of Privilege
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY On January 3 2018, side-channel security vulnerabilities involving speculative execution were publicly disclosed. These vulnerabilities may impact the listed HPE products, potentially leading to information disclosure and elevation of privilege. Mitigation and resolution of these vulnerabilities may call for both an operating system update, provided by the OS vendor, and a system ROM update from HPE.
Note:
- This issue takes advantage of techniques commonly used in many modern processor architectures.
-
For further information, microprocessor vendors have provided security advisories:
References:
- CVE-2017-5715 - aka Spectre, branch target injection
- CVE-2017-5753 - aka Spectre, bounds check bypass
- CVE-2017-5754 - aka Meltdown, rogue data cache load, memory access permission check performed after kernel memory read
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HPE ProLiant DL380 Gen10 Server - To be delivered
- HPE ProLiant DL180 Gen10 Server - To be delivered
- HPE ProLiant DL160 Gen10 Server - To be delivered
- HPE ProLiant DL360 Gen10 Server - To be delivered
- HPE ProLiant ML110 Gen10 Server - To be delivered
- HPE ProLiant DL580 Gen10 Server - To be delivered
- HPE ProLiant DL560 Gen10 Server - To be delivered
- HPE ProLiant DL120 Gen10 Server - To be delivered
- HPE ProLiant ML350 Gen10 Server - To be delivered
- HPE ProLiant XL450 Gen10 Server - To be delivered
- HPE Synergy 660 Gen10 Compute Module - To be delivered
- HPE ProLiant DL385 Gen10 Server - prior to v1.04
- HPE ProLiant XL170r Gen10 Server - To be delivered
- HPE ProLiant BL460c Gen10 Server Blade - To be delivered
- HPE ProLiant XL190r Gen10 Server - To be delivered
- HPE ProLiant XL230k Gen10 Server - To be delivered
- HPE Synergy 480 Gen10 Compute Module - To be delivered
- HPE ProLiant XL730f Gen9 Server - To be delivered
- HPE ProLiant XL230a Gen9 Server - To be delivered
- HPE ProLiant XL740f Gen9 Server - To be delivered
- HPE ProLiant XL750f Gen9 Server - To be delivered
- HPE ProLiant XL170r Gen9 Server - To be delivered
- HP ProLiant DL60 Gen9 Server - To be delivered
- HP ProLiant DL160 Gen9 Server - To be delivered
- HPE ProLiant DL360 Gen9 Server - To be delivered
- HP ProLiant DL380 Gen9 Server - To be delivered
- HPE ProLiant XL450 Gen9 Server - To be delivered
- HPE Apollo 4200 Gen9 Server - To be delivered
- HP ProLiant BL460c Gen9 Server Blade - To be delivered
- HP ProLiant ML110 Gen9 Server - To be delivered
- HP ProLiant ML150 Gen9 Server - To be delivered
- HPE ProLiant ML350 Gen9 Server - To be delivered
- HP ProLiant DL120 Gen9 Server - To be delivered
- HPE ProLiant DL560 Gen9 Server - To be delivered
- HP ProLiant BL660c Gen9 Server - To be delivered
- HPE ProLiant ML30 Gen9 Server - To be delivered
- HPE ProLiant XL170r Gen10 Server - To be delivered
- HPE ProLiant DL20 Gen9 Server - To be delivered
- HPE Synergy 660 Gen9 Compute Module - To be delivered
- HPE Synergy 480 Gen9 Compute Module - To be delivered
- HPE ProLiant XL250a Gen9 Server - To be delivered
- HPE ProLiant XL190r Gen9 Server - To be delivered
- HP ProLiant DL80 Gen9 Server - To be delivered
- HPE ProLiant DL180 Gen9 Server - To be delivered
- HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server - To be delivered
- HPE ProLiant WS460c Gen9 Workstation - To be delivered
- HPE ProLiant XL260a Gen9 Server - To be delivered
- HPE Synergy 620 Gen9 Compute Module - To be delivered
- HPE ProLiant DL580 Gen9 Server - To be delivered
- HP ProLiant XL220a Gen8 v2 Server - To be delivered
- HPE Synergy 680 Gen9 Compute Module - To be delivered
- HPE ProLiant m510 Server Cartridge - To be delivered
- HPE ProLiant m710p Server Cartridge - To be delivered
- HPE ProLiant m710x Server Cartridge - To be delivered
- HP ProLiant m710 Server Cartridge - To be delivered
- HP ProLiant DL980 G7 Server - To be delivered
- HPE Synergy Composer - To be delivered
- HPE ProLiant Thin Micro TM200 Server - To be delivered
- HPE ProLiant ML10 v2 Server - To be delivered
- HPE ProLiant m350 Server Cartridge - To be delivered
- HPE ProLiant m300 Server Cartridge - To be delivered
- HPE ProLiant MicroServer Gen8 - To be delivered
- HPE ProLiant ML310e Gen8 v2 Server - To be delivered
- HPE Superdome Flex Server - To be delivered
- HP 3PAR StoreServ File Controller - To be delivered - v3 impacted
- HPE StoreVirtual 3000 File Controller - To be delivered
- HPE StoreEasy 1450 Storage - To be delivered
- HPE StoreEasy 1550 Storage - To be delivered
- HPE StoreEasy 1650 Storage - To be delivered
- HPE StoreEasy 3850 Gateway Storage - To be delivered
- HPE StoreEasy 1850 Storage - To be delivered
- HP ConvergedSystem 700 - To be delivered
- HPE Converged Architecture 700 - To be delivered
- HP ProLiant DL580 Gen8 Server - To be delivered
- HPE Cloudline CL2100 Gen10 Server - To be delivered
- HPE Cloudline CL2200 Gen10 Server - To be delivered
- HPE Cloudline CL3150 G4 Server - To be delivered
- HPE Cloudline CL5200 G3 Server - To be delivered
- HPE Cloudline CL3100 G3 Server - To be delivered
- HPE Cloudline CL2100 G3 807S 8 SFF Configure-to-order Server - To be delivered
- HPE Cloudline CL2100 G3 407S 4 LFF Configure-to-order Server - To be delivered
- HPE Cloudline CL2100 G3 806R 8SFF Configure-to-order Server - To be delivered
- HPE Cloudline CL2200 G3 1211R 12 LFF Configure-to-order Server - To be delivered
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5715
8.2 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
6.8 (AV:A/AC:L/Au:N/C:C/I:P/A:N)
CVE-2017-5753
5.0 CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)
CVE-2017-5754
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
On January 11, Intel announced issues with an increased frequency of reboots when using the microcodes they released to address Variant 2 of the Spectre Vulnerability for numerous processors including Broadwell, Haswell, Skylake, Kaby Lake, Ivybridge, and Sandybridge processors. Intel has now identified the root cause of these issues and determined that these microcodes may introduce reboots and other unpredictable system behavior. Due to the severity of the potential issues that may occur when using these microcodes, Intel is now recommending that customers discontinue their use. Additional information is available from Intels Security Exploit Newsroom here: https://newsroom.intel.com/press-kits/security-exploits-intel-products/ . HPE is in alignment with Intel in our recommendation that customers discontinue use of System ROMs including impacted microcodes and revert to earlier System ROM versions.
All System ROMs including impacted microcodes have been removed from the HPE Support Site. This impacts HPE ProLiant and Synergy Gen10, Gen9, and Gen8 v2 servers as well as HPE Superdome servers for which updated System ROMs had previously been made available. Intel is working on updated microcodes to address these issues, and HPE will validate updated System ROMs including these microcodes and make them available to our customers in the coming weeks.
Mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown) vulnerabilities require only OS updates and are not impacted.
-
HPE has provided a customer bulletin https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us with specific instructions to obtain the udpated sytem ROM
-
Note:
- CVE-2017-5715 (Variant 2) requires that the System ROM be updated and a vendor supplied operating system update be applied as well.
- For CVE-2017-5753, CVE-2017-5754 (Variants 1 and 3) require only updates of a vendor supplied operating system.
- HPE will continue to add additional products to the list.
HISTORY
Version:1 (rev.1) - 4 January 2018 Initial release
Version:2 (rev.2) - 5 January 2018 Added additional impacted products
Version:3 (rev.3) - 10 January 2018 Added more impacted products
Version:4 (rev.4) - 9 January 2018 Fixed product ID
Version:5 (rev.5) - 18 January 2018 Added additional impacted products
Version:6 (rev.6) - 19 January 2018 updated impacted product list
Version:7 (rev.7) - 23 January 2018 Marked impacted products with TBD for System ROM updates per Intel's guidance on microcode issues
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to [email protected].
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: [email protected]
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. ========================================================================== Ubuntu Security Notice USN-3583-1 February 23, 2018
linux vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux: Linux kernel
Details:
It was discovered that an out-of-bounds write vulnerability existed in the Flash-Friendly File System (f2fs) in the Linux kernel. An attacker could construct a malicious file system that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0750)
It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861)
It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2017-1000407)
Bo Zhang discovered that the netlink wireless configuration interface in the Linux kernel did not properly validate attributes when handling certain requests. A local attacker with the CAP_NET_ADMIN could use this to cause a denial of service (system crash). (CVE-2017-12153)
Vitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel did not properly track reference counts when merging buffers. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2017-12190)
It was discovered that the key management subsystem in the Linux kernel did not properly restrict key reads on negatively instantiated keys. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-12192)
It was discovered that an integer overflow existed in the sysfs interface for the QLogic 24xx+ series SCSI driver in the Linux kernel. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2017-14051)
Otto Ebeling discovered that the memory manager in the Linux kernel did not properly check the effective UID in some situations. A local attacker could use this to expose sensitive information. (CVE-2017-14140)
It was discovered that the ATI Radeon framebuffer driver in the Linux kernel did not properly initialize a data structure returned to user space. (CVE-2017-14156)
ChunYu Wang discovered that the iSCSI transport implementation in the Linux kernel did not properly validate data structures. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-14489)
James Patrick-Evans discovered a race condition in the LEGO USB Infrared Tower driver in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15102)
ChunYu Wang discovered that a use-after-free vulnerability existed in the SCTP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code, (CVE-2017-15115)
It was discovered that the key management subsystem in the Linux kernel did not properly handle NULL payloads with non-zero length values. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-15274)
It was discovered that the Bluebooth Network Encapsulation Protocol (BNEP) implementation in the Linux kernel did not validate the type of socket passed in the BNEPCONNADD ioctl(). A local attacker with the CAP_NET_ADMIN privilege could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15868)
Andrey Konovalov discovered a use-after-free vulnerability in the USB serial console driver in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16525)
It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the systemwide OS fingerprint list. (CVE-2017-17450)
It was discovered that the HMAC implementation did not validate the state of the underlying cryptographic hash algorithm. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17806)
Denys Fedoryshchenko discovered a use-after-free vulnerability in the netfilter xt_TCPMSS filter of the Linux kernel. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-18017)
Gareth Evans discovered that the shm IPC subsystem in the Linux kernel did not properly restrict mapping page zero. A local privileged attacker could use this to execute arbitrary code. (CVE-2017-5669)
It was discovered that an integer overflow vulnerability existing in the IPv6 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (infinite loop). (CVE-2017-7542)
Tommi Rantala and Brad Spengler discovered that the memory manager in the Linux kernel did not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism. A local attacker with access to /dev/mem could use this to expose sensitive information or possibly execute arbitrary code. (CVE-2017-7889)
Mohamed Ghannam discovered a use-after-free vulnerability in the DCCP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-8824)
Mohamed Ghannam discovered a null pointer dereference in the RDS (Reliable Datagram Sockets) protocol implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5333)
ee3/4ePS discovered that a race condition existed in loop block device implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5344)
USN-3524-1 mitigated CVE-2017-5754 (Meltdown) for the amd64 architecture in Ubuntu 14.04 LTS. This update provides the corresponding mitigations for the ppc64el architecture. This flaw is known as Meltdown. (CVE-2017-5754)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: linux-image-3.13.0-142-generic 3.13.0-142.191 linux-image-3.13.0-142-generic-lpae 3.13.0-142.191 linux-image-3.13.0-142-lowlatency 3.13.0-142.191 linux-image-3.13.0-142-powerpc-e500 3.13.0-142.191 linux-image-3.13.0-142-powerpc-e500mc 3.13.0-142.191 linux-image-3.13.0-142-powerpc-smp 3.13.0-142.191 linux-image-3.13.0-142-powerpc64-emb 3.13.0-142.191 linux-image-3.13.0-142-powerpc64-smp 3.13.0-142.191 linux-image-generic 3.13.0.142.152 linux-image-generic-lpae 3.13.0.142.152 linux-image-lowlatency 3.13.0.142.152 linux-image-powerpc-e500 3.13.0.142.152 linux-image-powerpc-e500mc 3.13.0.142.152 linux-image-powerpc-smp 3.13.0.142.152 linux-image-powerpc64-emb 3.13.0.142.152 linux-image-powerpc64-smp 3.13.0.142.152
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/usn/usn-3583-1 CVE-2017-0750, CVE-2017-0861, CVE-2017-1000407, CVE-2017-12153, CVE-2017-12190, CVE-2017-12192, CVE-2017-14051, CVE-2017-14140, CVE-2017-14156, CVE-2017-14489, CVE-2017-15102, CVE-2017-15115, CVE-2017-15274, CVE-2017-15868, CVE-2017-16525, CVE-2017-17450, CVE-2017-17806, CVE-2017-18017, CVE-2017-5669, CVE-2017-5754, CVE-2017-7542, CVE-2017-7889, CVE-2017-8824, CVE-2018-5333, CVE-2018-5344
Package Information: https://launchpad.net/ubuntu/+source/linux/3.13.0-142.191
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-1711", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "xeon e5 2650l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "720qm" }, { "model": "xeon e3 1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7235" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6585r" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3710" }, { "model": "xeon e5 2430l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210m" }, { "model": "xeon e3 1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10c" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5550" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6154" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "740qm" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6510" }, { "model": "xeon e3 1225 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3235rk" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4720hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4000m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2405s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2435m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3380m" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1545m_v5" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360" }, { "model": "xeon e5 2637", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2518" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3317u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700ec" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "460m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4807" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3480" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3580" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y32" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5677" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330m" }, { "model": "xeon e3 1278l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x6550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5750hq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570r" }, { "model": "xeon e3 1265l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2760qm" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134m" }, { "model": "xeon e5 2430 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "650" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3295rk" }, { "model": "xeon e3 1280 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4109t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5550u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3690" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v2" }, { "model": "xeon e5 2603 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6260u" }, { "model": "xeon e5 2620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1281 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660" }, { "model": "xeon e5 2450l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735d" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2340ue" }, { "model": "xeon e5 2630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867l" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5618" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y30" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775c" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8180" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460" }, { "model": "xeon e3 1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2650l_v4" }, { "model": "xeon e5 2420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675c" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v2" }, { "model": "xeon e5 2648l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5557u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v3" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3445" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3455" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2629m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3700" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138f" }, { "model": "xeon e5 2438l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5257u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5502" }, { "model": "xeon bronze 3106", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2480" }, { "model": "xeon e5 2470 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600t" }, { "model": "xeon e5 2407 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2450 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2675qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2940" }, { "model": "xeon e5 2609 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350k" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1850" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2358" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460t" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7285" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460s" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2900" }, { "model": "xeon e5 2609 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2550" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3808" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3350" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5200u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4260u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5506" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126f" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4750hq" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1515m_v5" }, { "model": "xeon e3 1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qm" }, { "model": "xeon e5 2418l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4722hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5500u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8650u" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3205rk" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v5" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2540m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5650" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3720qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210" }, { "model": "core m7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y75" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3785" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820eq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3827" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2102" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610me" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1800" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330e" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3010" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "470um" }, { "model": "xeon e5 1428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v3" }, { "model": "xeon e5 2430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4890_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5649" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "610e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370t" }, { "model": "xeon e5 2428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2640 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667" }, { "model": "xeon e5 2618l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2300" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "530" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660lm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5690" }, { "model": "xeon e5 2643 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2390t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4105" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2515e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3530" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4880_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176f" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1565l_v5" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4648_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600u" }, { "model": "xeon e5 1660 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2467m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850hq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5680" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8857_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8837" }, { "model": "xeon e5 2620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4800mq" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2830" }, { "model": "xeon e3 1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3406" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4628l_v4" }, { "model": "xeon e5 2618l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3480" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2665" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v2" }, { "model": "xeon e3 1220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500t" }, { "model": "xeon e5 2630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2550k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3689y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700hq" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3538" }, { "model": "xeon e3 1265l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5672" }, { "model": "xeon e5 1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hk" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v2" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3570" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3350p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3440" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3560" }, { "model": "xeon e5 1680 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3437u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300y" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3460" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3355" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6157u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5667" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160f" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4624l_v2" }, { "model": "xeon e5 1650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140m" }, { "model": "xeon e3 1268l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4550u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2520" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200u" }, { "model": "xeon e5 2608l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2803" }, { "model": "xeon e5 2643 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5518" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980x" }, { "model": "xeon e5 1620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2538" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3308" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y51" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4250u" }, { "model": "xeon e5 2637 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770r" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3955" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2357m" }, { "model": "xeon e3 1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hq" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2460" }, { "model": "xeon e3 1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8158" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6006u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4158u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217ue" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2750" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585l_v5" }, { "model": "xeon e5 2408l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3758" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3360m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7530" }, { "model": "xeon e5 1650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2348m" }, { "model": "xeon e3 1275 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v2" }, { "model": "xeon e3 1240 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v2" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3229y" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3845" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2308" }, { "model": "xeon e3 1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702ec" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650" }, { "model": "xeon e5 2637 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620ue" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5503" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6200u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4510u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5640" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200m" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y71" }, { "model": "xeon e5 2630l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5122" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2370m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3427u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5575r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4558u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710mq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8168" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2630qm" }, { "model": "xeon e3 1241 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4422e" }, { "model": "xeon e3 1230l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2312m" }, { "model": "xeon e3 1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7555" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700" }, { "model": "xeon e3 1271 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3635qm" }, { "model": "xeon e3 1260l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6167u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330te" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134" }, { "model": "xeon e3 1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7567u" }, { "model": "xeon e5 1650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "965" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3115c" }, { "model": "xeon e3 1245 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5670" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2738" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940xm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3430" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660ue" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "975" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5675" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450m" }, { "model": "xeon e3 1240 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658" }, { "model": "xeon e5 2623 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qm" }, { "model": "xeon e3 1285 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4000" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3470" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4760hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "990x" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200h" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8600k" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6146" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4960hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v3" }, { "model": "xeon e5 2628l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v3" }, { "model": "xeon e5 2630 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3590" }, { "model": "xeon e5 1428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v3" }, { "model": "xeon e5 2448l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5549" }, { "model": "xeon e5 2428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745d" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7545" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850eq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5508" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2350" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2560" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2758" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120me" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7560u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5509" }, { "model": "xeon e5 2637 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y75" }, { "model": "xeon e3 1285l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3958" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6102e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4302y" }, { "model": "xeon e5 2418l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3805" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3825" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770d" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3337u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3508" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8153" }, { "model": "xeon e5 2603 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5118" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2910" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3405" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2657m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5250u" }, { "model": "xeon e3 1286l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1660 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5115" }, { "model": "xeon e3 12201 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590t" }, { "model": "xeon e5 2640 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "880" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3820qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2520m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650u" }, { "model": "xeon e3 1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5640" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4005" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3826" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2367m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3740qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2808" }, { "model": "xeon e3 1225 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5647" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4980hq" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3710" }, { "model": "xeon e3 1240l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2715qe" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4020y" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3460" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2130" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3670" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v2" }, { "model": "xeon e5 2430l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2718" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2610ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "390m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v3" }, { "model": "xeon e5 2448l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4025u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6360u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7920hq" }, { "model": "xeon e5 2407", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870hq" }, { "model": "xeon e3 1275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v3" }, { "model": "xeon e3 1270 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "930" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2655le" }, { "model": "xeon e3 1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2807" }, { "model": "xeon e3 1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y31" }, { "model": "xeon e5 2618l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8550u" }, { "model": "xeon e3 1220 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5506" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920xm" }, { "model": "xeon e3 1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3630qm" }, { "model": "xeon e5 2450l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670k" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2840" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7542" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620m" }, { "model": "xeon e3 1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2410m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400t" }, { "model": "xeon e5 1620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3130" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3339y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2620m" }, { "model": "xeon e3 1276 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1558l_v5" }, { "model": "xeon e3 1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4108" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2516" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2960xm" }, { "model": "xeon e5 2650l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "840qm" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699r_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4400e" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6152" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3815" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v4" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2920" }, { "model": "xeon e5 1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6685r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770s" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2815" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230f" }, { "model": "xeon e3 1220l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "970" }, { "model": "xeon e3 1230 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3225" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "875k" }, { "model": "xeon e3 1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350h" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1578l_v5" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3840qm" }, { "model": "xeon e3 1226 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v6" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4308u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2920xm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3338" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712mq" }, { "model": "xeon e5 1428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3230m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2720qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3227u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740d" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2930" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5539" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5157u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8164" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658a_v3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690" }, { "model": "xeon e5 2648l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2380p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5528" }, { "model": "xeon e3 1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700mq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5606" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4005u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640lm" }, { "model": "xeon e5 2628l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y57" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "820qm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3450" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600k" }, { "model": "xeon e3 1285 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2730" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3426" }, { "model": "xeon e3 12201", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v4" }, { "model": "xeon e5 2418l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3475s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340te" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2637m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3750" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120m" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1750" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "580m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5540" }, { "model": "xeon e5 1630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6136" }, { "model": "xeon e5 2450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699a_v4" }, { "model": "xeon e5 2403", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4785t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2375m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860hq" }, { "model": "xeon e3 1270 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3200rk" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770te" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585_v5" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "670" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "960" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6128" }, { "model": "xeon e5 2403 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440eq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2700k" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3230rk" }, { "model": "xeon e3 1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7540" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v2" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2649m" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4205" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2580" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6402p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8830" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7295" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5660" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660um" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2617m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697a_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870" }, { "model": "xeon e3 1245 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3667u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v3" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2806" }, { "model": "xeon e5 1630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775r" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736f" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2557m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4578u" }, { "model": "xeon e5 2470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6144" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3050" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2316" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "350m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030u" }, { "model": "xeon e5 2648l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5645" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5590" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4910mq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6287u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100u" }, { "model": "xeon e3 1220 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-1105c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v3" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "75" }, { "model": "xeon e3 1258l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4202y" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100h" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2320" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8250u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3858" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2508" }, { "model": "xeon e3 1235", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650l" }, { "model": "xeon e3 1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3520m" }, { "model": "xeon e5 2640 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7660u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4410e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5638" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1575m_v5" }, { "model": "xeon e3 1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750" }, { "model": "xeon e5 2609 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "370m" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2810" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1900" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2430m" }, { "model": "xeon e5 1620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210f" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6132" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5630" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2890_v2" }, { "model": "xeon e5 1660 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4200" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v4" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5607" }, { "model": "xeon e3 1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4012y" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y70" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4771" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520e" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3520" }, { "model": "xeon e5 2420 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6540" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5518" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5650u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620um" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5620" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "480m" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775d" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620lm" }, { "model": "xeon e3 1246 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1265l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4278u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3130m" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230" }, { "model": "xeon e3 1275l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2640m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5119t" }, { "model": "xeon e5 2623 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2125" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2805" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4657l_v2" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y30" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517ue" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5570" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5520" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3320m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3245" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2420" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2510e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3632qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710hq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6150" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3687u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5015u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6267u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300u" }, { "model": "xeon e3 1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1285l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v4" }, { "model": "xeon e3 1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4765t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3830" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670t" }, { "model": "xeon e5 1660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3680" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5287u" }, { "model": "xeon e5 2630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v3" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2635qm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670r" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300" }, { "model": "xeon e3 1230 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v4" }, { "model": "xeon e5 2440 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5603" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "655k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4102e" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1505m_v6" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4810mq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8400" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5609" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210h" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3708" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6442eq" }, { "model": "xeon e3 1290 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2648l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1680 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3439y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2365m" }, { "model": "xeon e3 1231 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8156" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6098p" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5504" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4288u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4900mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5630" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2537m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3555le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350u" }, { "model": "xeon e3 1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5020u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "661" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2677m" }, { "model": "xeon e5 2628l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3510" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2338" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8894_v4" }, { "model": "xeon e3 1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4258u" }, { "model": "xeon e5 2609", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5507" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2820" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680" }, { "model": "xeon e5 2640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5010u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4617" }, { "model": "xeon e3 1280 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2377m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2115c" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2710qe" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5580" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4120u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2350m" }, { "model": "xeon e3 1105c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4220y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500te" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7560" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6350hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430s" }, { "model": "xeon e3 1286 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3450" }, { "model": "xeon bronze 3104", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1290", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2880_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6320" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5005u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680um" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3795" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "450m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702hq" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10a" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5687" }, { "model": "xeon e3 1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v4" }, { "model": "xeon e5 2620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330e" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y54" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2328m" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380um" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2105" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3150" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3000" }, { "model": "xeon e5 2608l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440hq" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3265rk" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3537u" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "amd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "arm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell emc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "qualcomm incorporated", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "synology", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": "hat enterprise linux desktop", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "6" }, { "model": "windows server r2", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "2008" }, { "model": "windows for 32-bit systems sp1", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "7" }, { "model": "windows for x64-based systems sp1", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "7" }, { "model": "hat enterprise linux", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux workstation", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "6" }, { "model": "windows windows server", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "2012" }, { "model": "windows", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "8.1" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "google", "version": "v8" }, { "model": "windows server r2", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "2012" }, { "model": "edge", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "0" }, { "model": "internet explorer", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "11" }, { "model": "windows server", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "2016" }, { "model": "windows for x64-based systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "8.10" }, { "model": "windows for 32-bit systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "8.10" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "1015110" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "1015110" }, { "model": "windows for 32-bit systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "10" }, { "model": "windows for x64-based systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "10" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "101511" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "101511" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "101607" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "101607" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "101703" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "101703" }, { "model": "hat enterprise linux workstation", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "7" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "7" }, { "model": "hat enterprise linux desktop", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "7" }, { "model": "esxi", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "5.5" }, { "model": "tvos", "scope": "lt", "trust": 0.6, "vendor": "apple", "version": "11.2" }, { "model": "ios", "scope": "lt", "trust": 0.6, "vendor": "apple", "version": "11.2" }, { "model": "xeon cpu e5-1650", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "workstation", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "12.5.7" }, { "model": "workstation", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "12.5.5" }, { "model": "workstation", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "12.5.3" }, { "model": "workstation", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "12.0" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.5.8" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.5.6" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.5.4" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.5.2" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.1.1" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.1" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.0.2" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.0.1" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.5.5" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.5" }, { "model": "fusion", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "8.0" }, { "model": "esxi", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "6.5" }, { "model": "esxi", "scope": "eq", "trust": 0.6, "vendor": "vmware", "version": "6.0" }, { "model": "hat enterprise linux server tus", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "7.4" }, { "model": "hat enterprise linux server tus", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "7.2" }, { "model": "hat enterprise linux server tus", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "6.6" }, { "model": "hat enterprise linux server aus", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "7.4" }, { "model": "hat enterprise linux server aus", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "7.2" }, { "model": "hat enterprise linux server aus", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "7.3" }, { "model": "hat enterprise linux server aus", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "6.6" }, { "model": "macos", "scope": "lt", "trust": 0.6, "vendor": "apple", "version": "10.13.2" }, { "model": "cloud services platform", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2100" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge cloud", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "vedge", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2000" }, { "model": "vedge", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "100" }, { "model": "vedge", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000" } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00303" }, { "db": "NVD", "id": "CVE-2017-5754" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu", "sources": [ { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "146017" }, { "db": "PACKETSTORM", "id": "145795" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146534" } ], "trust": 0.5 }, "cve": "CVE-2017-5754", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2017-5754", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CNVD-2018-00303", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-113957", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2017-5754", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2017-5754", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-00303", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-113957", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00303" }, { "db": "VULHUB", "id": "VHN-113957" }, { "db": "NVD", "id": "CVE-2017-5754" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache. Two vulnerabilities are identified, known as \"Variant 3a\" and \"Variant 4\". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Spectre vulnerability exists in the CPU processor core. Because Intel does not separate low-privileged applications from accessing kernel memory, an attacker can use a malicious application to obtain private data that should be quarantined. Intel and ARM CPU chips have an information disclosure vulnerability, which originates from a flaw in the processor data boundary mechanism. The following products and versions are affected: ARM Cortex-A75; Intel Xeon E5-1650 v3, v2, v4; Xeon E3-1265l v2, v3, v4; Xeon E3-1245 v2, v3, v5, v6; Xeon X7542 wait. If not, head over to https://meltdownattack.com/ and get an\noverview. \nhttps://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\n\nThe FreeBSD Security Team was notified of the issue in late December\nand received a briefing under NDA with the original embargo date of\nJanuary 9th. Since we received relatively late notice of the issue, our\nability to provide fixes is delayed. \n\nMeltdown (CVE-2017-5754)\n~~~~~~~~~~~~~~~~~~~~~~~~\nIn terms of priority, the first step is to mitigate against the Meltdown\nattack (CVE-2017-5754, cited as variant 3 by Project Zero). Work for\nthis is ongoing, but due to the relatively large changes needed, this is\ngoing to take a little while. We are currently targeting patches for\namd64 being dev complete this week with testing probably running into\nnext week. From there, we hope to give it a short bake time before\npushing it into the 11.1-RELEASE branch. Additional work will be\nrequired to bring the mitigation to 10.3-RELEASE and 10.4-RELEASE. \n\nThe code will be selectable via a tunable which will automatically turn\non for modern Intel processors and off for AMD processors (since they\nare reportedly not vulnerable). Since the fix for Meltdown does incur a\nperformance hit for any transition between user space and kernel space,\nthis could be rather impactful depending on the workload. As such, the\ntunable can also be overridden by the end-user if they are willing to\naccept the risk. \n\nInitial work can be tracked at https://reviews.freebsd.org/D13797. \nPlease note this is a work in progress and some stuff is likely to be\nbroken. \n\nSpectre (CVE-2017-5753 and CVE-2017-5715)\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\nWhen it comes to the Spectre vulnerabilities, it is much harder to sort\nthese out. Variant 1 (CVE-2017-5753) is going to require some static\nanalysis to determine vulnerable use cases that will require barriers to\nstop speculation from disclosing information it shouldn\u0027t. While we\nhaven\u0027t done the analysis to determine where we are vulnerable, the\nnumber of cases here are supposed to be pretty small. Apparently there\nhave been some Coverity rules developed to help look for these, but we\nare still evaluating what can be done here. \n\nThe other half of Spectre, variant 2 (CVE-2017-5715) is a bit trickier\nas it affects both normal processes and bhyve. There is a proposed patch\nfor LLVM (https://reviews.llvm.org/D41723) that introduces a concept\ncalled \u0027retpoline\u0027 which mitigates this issue. We are likely to pull\nthis into HEAD and 11-STABLE once it hits the LLVM tree. Unfortunately,\nthe currently supported FreeBSD releases are using older versions of\nLLVM for which we are not sure the LLVM project will produce patches. We\nwill be looking at the feasibility to backport these patches to these\nearlier versions. \n\nThere are CPU microcode fixes coming out when in concert with OS changes\nwould also help, but that\u0027s a bit down the road at the moment. \n\nBest regards,\nGordon Tetlow\nwith security-officer hat on\n. On i386 and amd64\narchitectures, the IBRS and IBPB features are required to enable the\nkernel mitigations. Ubuntu is working with Intel and AMD to provide\nfuture microcode updates that implement IBRS and IBPB as they are made\navailable. Ubuntu users with a processor from a different vendor should\ncontact the vendor to identify necessary firmware updates. Ubuntu\nwill provide corresponding QEMU updates in the future for users of\nself-hosted virtual environments in coordination with upstream QEMU. \nUbuntu users in cloud environments should contact the cloud provider\nto confirm that the hypervisor has been updated to expose the new\nCPU features to virtual machines. X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16\nX-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 04 Jan 2018 01:01:01 +0000 (UTC)\n\n\n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: kernel security update\nAdvisory ID: RHSA-2018:0008-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:0008\nIssue date: 2018-01-03\n=====================================================================\n\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. \n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a commonly\nused performance optimization). There are three primary variants of the\nissue which differ in the way the speculative execution can be exploited. \n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software mitigation\nfor this hardware issue at a cost of potential performance penalty. \n\nVariant CVE-2017-5753 triggers the speculative execution by performing a\nbounds-check bypass. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nand guest/host boundaries and read privileged memory by conducting targeted\ncache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors,\nduring speculative execution of instruction permission faults, exception\ngeneration triggered by a faulting access is suppressed until the\nretirement of the whole instruction block. In a combination with the fact\nthat memory accesses may populate the cache even when the block is being\ndropped and never committed (executed), an unprivileged local attacker\ncould use this flaw to read privileged (kernel space) memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue. \n\nRed Hat would like to thank Google Project Zero for reporting these issues. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass\n1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection\n1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nkernel-2.6.32-696.18.7.el6.src.rpm\n\ni386:\nkernel-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm\nkernel-devel-2.6.32-696.18.7.el6.i686.rpm\nkernel-headers-2.6.32-696.18.7.el6.i686.rpm\nperf-2.6.32-696.18.7.el6.i686.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm\nkernel-doc-2.6.32-696.18.7.el6.noarch.rpm\nkernel-firmware-2.6.32-696.18.7.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-devel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-headers-2.6.32-696.18.7.el6.x86_64.rpm\nperf-2.6.32-696.18.7.el6.x86_64.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\npython-perf-2.6.32-696.18.7.el6.i686.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nkernel-2.6.32-696.18.7.el6.src.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm\nkernel-doc-2.6.32-696.18.7.el6.noarch.rpm\nkernel-firmware-2.6.32-696.18.7.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-devel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-headers-2.6.32-696.18.7.el6.x86_64.rpm\nperf-2.6.32-696.18.7.el6.x86_64.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nkernel-2.6.32-696.18.7.el6.src.rpm\n\ni386:\nkernel-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm\nkernel-devel-2.6.32-696.18.7.el6.i686.rpm\nkernel-headers-2.6.32-696.18.7.el6.i686.rpm\nperf-2.6.32-696.18.7.el6.i686.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm\nkernel-doc-2.6.32-696.18.7.el6.noarch.rpm\nkernel-firmware-2.6.32-696.18.7.el6.noarch.rpm\n\nppc64:\nkernel-2.6.32-696.18.7.el6.ppc64.rpm\nkernel-bootwrapper-2.6.32-696.18.7.el6.ppc64.rpm\nkernel-debug-2.6.32-696.18.7.el6.ppc64.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-696.18.7.el6.ppc64.rpm\nkernel-devel-2.6.32-696.18.7.el6.ppc64.rpm\nkernel-headers-2.6.32-696.18.7.el6.ppc64.rpm\nperf-2.6.32-696.18.7.el6.ppc64.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm\n\ns390x:\nkernel-2.6.32-696.18.7.el6.s390x.rpm\nkernel-debug-2.6.32-696.18.7.el6.s390x.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.s390x.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.s390x.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-696.18.7.el6.s390x.rpm\nkernel-devel-2.6.32-696.18.7.el6.s390x.rpm\nkernel-headers-2.6.32-696.18.7.el6.s390x.rpm\nkernel-kdump-2.6.32-696.18.7.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-696.18.7.el6.s390x.rpm\nkernel-kdump-devel-2.6.32-696.18.7.el6.s390x.rpm\nperf-2.6.32-696.18.7.el6.s390x.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm\n\nx86_64:\nkernel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-devel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-headers-2.6.32-696.18.7.el6.x86_64.rpm\nperf-2.6.32-696.18.7.el6.x86_64.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\npython-perf-2.6.32-696.18.7.el6.i686.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\n\nppc64:\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-696.18.7.el6.ppc64.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm\npython-perf-2.6.32-696.18.7.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm\n\ns390x:\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.s390x.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-696.18.7.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-696.18.7.el6.s390x.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm\npython-perf-2.6.32-696.18.7.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nkernel-2.6.32-696.18.7.el6.src.rpm\n\ni386:\nkernel-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm\nkernel-devel-2.6.32-696.18.7.el6.i686.rpm\nkernel-headers-2.6.32-696.18.7.el6.i686.rpm\nperf-2.6.32-696.18.7.el6.i686.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm\nkernel-doc-2.6.32-696.18.7.el6.noarch.rpm\nkernel-firmware-2.6.32-696.18.7.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm\nkernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-devel-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-headers-2.6.32-696.18.7.el6.x86_64.rpm\nperf-2.6.32-696.18.7.el6.x86_64.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\npython-perf-2.6.32-696.18.7.el6.i686.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm\nperf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-2.6.32-696.18.7.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. Contact:\n\nThe Red Hat security contact is \[email protected]\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFaTXwuXlSAg2UNWIIRAp3LAKCNdSqjVu7zsXcUTnpGuuQAuUlTpwCfTE/O\nOR+iGnoY+cALbsBWKwbmzQM=\n=V4ow\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\[email protected]\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nBug Fix(es):\n\n* The kernel build requirements have been updated to the GNU Compiler\nCollection (GCC) compiler version that has the support for Retpolines. The\nRetpolines mechanism is a software construct that leverages specific\nknowledge of the underlying hardware to mitigate the branch target\ninjection, also known as Spectre variant 2 vulnerability described in\nCVE-2017-5715. (BZ#1554251)\n\n4. 6.5) - x86_64\n\n3. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-18:03.speculative_execution Security Advisory\n The FreeBSD Project\n\nTopic: Speculative Execution Vulnerabilities\n\nCategory: core\nModule: kernel\nAnnounced: 2018-03-14\nCredits: Jann Horn (Google Project Zero); Werner Haas, Thomas\n Prescher (Cyberus Technology); Daniel Gruss, Moritz Lipp,\n Stefan Mangard, Michael Schwarz (Graz University of\n Technology); Paul Kocher; Daniel Genkin (University of\n Pennsylvania and University of Maryland), Mike Hamburg\n (Rambus); Yuval Yarom (University of Adelaide and Data6)\nAffects: All supported versions of FreeBSD. \nCorrected: 2018-02-17 18:00:01 UTC (stable/11, 11.1-STABLE)\n 2018-03-14 04:00:00 UTC (releng/11.1, 11.1-RELEASE-p8)\nCVE Name: CVE-2017-5715, CVE-2017-5754\n\nSpecial Note:\tSpeculative execution vulnerability mitigation is a work\n in progress. This advisory addresses the most significant\n issues for FreeBSD 11.1 on amd64 CPUs. We expect to update\n this advisory to include 10.x for amd64 CPUs. Future FreeBSD\n releases will address this issue on i386 and other CPUs. \n freebsd-update will include changes on i386 as part of this\n update due to common code changes shared between amd64 and\n i386, however it contains no functional changes for i386 (in\n particular, it does not mitigate the issue on i386). \n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:https://security.FreeBSD.org/\u003e. \n\nII. Problem Description\n\nA number of issues relating to speculative execution were found last year\nand publicly announced January 3rd. Two of these, known as Meltdown and\nSpectre V2, are addressed here. \n\nCVE-2017-5754 (Meltdown)\n- ------------------------\n\nThis issue relies on an affected CPU speculatively executing instructions\nbeyond a faulting instruction. When this happens, changes to architectural\nstate are not committed, but observable changes may be left in micro-\narchitectural state (for example, cache). This may be used to infer\nprivileged data. \n\nCVE-2017-5715 (Spectre V2)\n- --------------------------\n\nSpectre V2 uses branch target injection to speculatively execute kernel code\nat an address under the control of an attacker. \n\nIII. Impact\n\nAn attacker may be able to read secret data from the kernel or from a\nprocess when executing untrusted code (for example, in a web browser). \n\nIV. Workaround\n\nNo workaround is available. \n\nV. Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date,\nand reboot. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility, followed\nby a reboot into the new kernel:\n\n# freebsd-update fetch\n# freebsd-update install\n# shutdown -r now\n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 11.1]\n# fetch https://security.FreeBSD.org/patches/SA-18:03/speculative_execution-amd64-11.patch\n# fetch https://security.FreeBSD.org/patches/SA-18:03/speculative_execution-amd64-11.patch.asc\n# gpg --verify speculative_execution-amd64-11.patch.asc\n\nb) Apply the patch. Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile your kernel as described in\n\u003cURL:https://www.FreeBSD.org/handbook/kernelconfig.html\u003e and reboot the\nsystem. \n\nVI. Correction details\n\nCVE-2017-5754 (Meltdown)\n- ------------------------\n\nThe mitigation is known as Page Table Isolation (PTI). PTI largely separates\nkernel and user mode page tables, so that even during speculative execution\nmost of the kernel\u0027s data is unmapped and not accessible. A positive result is definitive\n(that is, the vulnerability exists with certainty). A negative result\nindicates either that the CPU is not affected, or that the test is not\ncapable of demonstrating the issue on the CPU (and may need to be modified). \n\nA patched kernel will automatically enable PTI on Intel CPUs. The status can\nbe checked via the vm.pmap.pti sysctl:\n\n# sysctl vm.pmap.pti\nvm.pmap.pti: 1\n\nThe default setting can be overridden by setting the loader tunable\nvm.pmap.pti to 1 or 0 in /boot/loader.conf. This setting takes effect only\nat boot. \n\nPTI introduces a performance regression. The observed performance loss is\nsignificant in microbenchmarks of system call overhead, but is much smaller\nfor many real workloads. \n\nCVE-2017-5715 (Spectre V2)\n- --------------------------\n\nThere are two common mitigations for Spectre V2. This patch includes a\nmitigation using Indirect Branch Restricted Speculation, a feature available\nvia a microcode update from processor manufacturers. The alternate\nmitigation, Retpoline, is a feature available in newer compilers. The\nfeasibility of applying Retpoline to stable branches and/or releases is under\ninvestigation. \n\nThe patch includes the IBRS mitigation for Spectre V2. To use the mitigation\nthe system must have an updated microcode; with older microcode a patched\nkernel will function without the mitigation. \n\nIBRS can be disabled via the hw.ibrs_disable sysctl (and tunable), and the\nstatus can be checked via the hw.ibrs_active sysctl. IBRS may be enabled or\ndisabled at runtime. Additional detail on microcode updates will follow. \n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path Revision\n- -------------------------------------------------------------------------\nstable/11/ r329462\nreleng/11.1/ r330908\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n\u003cURL:https://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\u003e\n\nVII. 7) - noarch, x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: hpesbhf03805en_us\nVersion: 7\n\nHPESBHF03805 rev.7 - Certain HPE products using Microprocessors from Intel,\nAMD, and ARM, with Speculative Execution, Elevation of Privilege and\nInformation Disclosure. \n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2018-01-23\nLast Updated: 2018-01-22\n\nPotential Security Impact: Local: Disclosure of Information, Elevation of\nPrivilege\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nOn January 3 2018, side-channel security vulnerabilities involving\nspeculative execution were publicly disclosed. These vulnerabilities may\nimpact the listed HPE products, potentially leading to information disclosure\nand elevation of privilege. Mitigation and resolution of these\nvulnerabilities may call for both an operating system update, provided by the\nOS vendor, and a system ROM update from HPE. \n\n\n**Note:**\n\n * This issue takes advantage of techniques commonly used in many modern\nprocessor architectures. \n * For further information, microprocessor vendors have provided security\nadvisories:\n \n - Intel:\n\u003chttps://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026langu\ngeid=en-fr\u003e\n - AMD: \u003chttp://www.amd.com/en/corporate/speculative-execution\u003e\n - ARM: \u003chttps://developer.arm.com/support/security-update\u003e\n\nReferences:\n\n - CVE-2017-5715 - aka Spectre, branch target injection\n - CVE-2017-5753 - aka Spectre, bounds check bypass\n - CVE-2017-5754 - aka Meltdown, rogue data cache load, memory access\npermission check performed after kernel memory read\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\n - HPE ProLiant DL380 Gen10 Server - To be delivered\n - HPE ProLiant DL180 Gen10 Server - To be delivered\n - HPE ProLiant DL160 Gen10 Server - To be delivered\n - HPE ProLiant DL360 Gen10 Server - To be delivered\n - HPE ProLiant ML110 Gen10 Server - To be delivered\n - HPE ProLiant DL580 Gen10 Server - To be delivered\n - HPE ProLiant DL560 Gen10 Server - To be delivered\n - HPE ProLiant DL120 Gen10 Server - To be delivered\n - HPE ProLiant ML350 Gen10 Server - To be delivered\n - HPE ProLiant XL450 Gen10 Server - To be delivered\n - HPE Synergy 660 Gen10 Compute Module - To be delivered\n - HPE ProLiant DL385 Gen10 Server - prior to v1.04 \n - HPE ProLiant XL170r Gen10 Server - To be delivered\n - HPE ProLiant BL460c Gen10 Server Blade - To be delivered\n - HPE ProLiant XL190r Gen10 Server - To be delivered\n - HPE ProLiant XL230k Gen10 Server - To be delivered\n - HPE Synergy 480 Gen10 Compute Module - To be delivered\n - HPE ProLiant XL730f Gen9 Server - To be delivered\n - HPE ProLiant XL230a Gen9 Server - To be delivered\n - HPE ProLiant XL740f Gen9 Server - To be delivered\n - HPE ProLiant XL750f Gen9 Server - To be delivered\n - HPE ProLiant XL170r Gen9 Server - To be delivered\n - HP ProLiant DL60 Gen9 Server - To be delivered\n - HP ProLiant DL160 Gen9 Server - To be delivered\n - HPE ProLiant DL360 Gen9 Server - To be delivered\n - HP ProLiant DL380 Gen9 Server - To be delivered\n - HPE ProLiant XL450 Gen9 Server - To be delivered\n - HPE Apollo 4200 Gen9 Server - To be delivered\n - HP ProLiant BL460c Gen9 Server Blade - To be delivered\n - HP ProLiant ML110 Gen9 Server - To be delivered\n - HP ProLiant ML150 Gen9 Server - To be delivered\n - HPE ProLiant ML350 Gen9 Server - To be delivered\n - HP ProLiant DL120 Gen9 Server - To be delivered\n - HPE ProLiant DL560 Gen9 Server - To be delivered\n - HP ProLiant BL660c Gen9 Server - To be delivered\n - HPE ProLiant ML30 Gen9 Server - To be delivered\n - HPE ProLiant XL170r Gen10 Server - To be delivered\n - HPE ProLiant DL20 Gen9 Server - To be delivered\n - HPE Synergy 660 Gen9 Compute Module - To be delivered\n - HPE Synergy 480 Gen9 Compute Module - To be delivered\n - HPE ProLiant XL250a Gen9 Server - To be delivered\n - HPE ProLiant XL190r Gen9 Server - To be delivered\n - HP ProLiant DL80 Gen9 Server - To be delivered\n - HPE ProLiant DL180 Gen9 Server - To be delivered\n - HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server -\nTo be delivered\n - HPE ProLiant WS460c Gen9 Workstation - To be delivered\n - HPE ProLiant XL260a Gen9 Server - To be delivered\n - HPE Synergy 620 Gen9 Compute Module - To be delivered\n - HPE ProLiant DL580 Gen9 Server - To be delivered\n - HP ProLiant XL220a Gen8 v2 Server - To be delivered\n - HPE Synergy 680 Gen9 Compute Module - To be delivered\n - HPE ProLiant m510 Server Cartridge - To be delivered\n - HPE ProLiant m710p Server Cartridge - To be delivered\n - HPE ProLiant m710x Server Cartridge - To be delivered\n - HP ProLiant m710 Server Cartridge - To be delivered\n - HP ProLiant DL980 G7 Server - To be delivered\n - HPE Synergy Composer - To be delivered\n - HPE ProLiant Thin Micro TM200 Server - To be delivered\n - HPE ProLiant ML10 v2 Server - To be delivered\n - HPE ProLiant m350 Server Cartridge - To be delivered\n - HPE ProLiant m300 Server Cartridge - To be delivered\n - HPE ProLiant MicroServer Gen8 - To be delivered\n - HPE ProLiant ML310e Gen8 v2 Server - To be delivered\n - HPE Superdome Flex Server - To be delivered\n - HP 3PAR StoreServ File Controller - To be delivered - v3 impacted\n - HPE StoreVirtual 3000 File Controller - To be delivered\n - HPE StoreEasy 1450 Storage - To be delivered\n - HPE StoreEasy 1550 Storage - To be delivered\n - HPE StoreEasy 1650 Storage - To be delivered\n - HPE StoreEasy 3850 Gateway Storage - To be delivered\n - HPE StoreEasy 1850 Storage - To be delivered\n - HP ConvergedSystem 700 - To be delivered\n - HPE Converged Architecture 700 - To be delivered\n - HP ProLiant DL580 Gen8 Server - To be delivered\n - HPE Cloudline CL2100 Gen10 Server - To be delivered\n - HPE Cloudline CL2200 Gen10 Server - To be delivered\n - HPE Cloudline CL3150 G4 Server - To be delivered\n - HPE Cloudline CL5200 G3 Server - To be delivered\n - HPE Cloudline CL3100 G3 Server - To be delivered\n - HPE Cloudline CL2100 G3 807S 8 SFF Configure-to-order Server - To be\ndelivered\n - HPE Cloudline CL2100 G3 407S 4 LFF Configure-to-order Server - To be\ndelivered\n - HPE Cloudline CL2100 G3 806R 8SFF Configure-to-order Server - To be\ndelivered\n - HPE Cloudline CL2200 G3 1211R 12 LFF Configure-to-order Server - To be\ndelivered\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2017-5715\n 8.2 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N\n 6.8 (AV:A/AC:L/Au:N/C:C/I:P/A:N)\n\n CVE-2017-5753\n 5.0 CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L\n 5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)\n\n CVE-2017-5754\n 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nOn January 11, Intel announced issues with an increased frequency of reboots\nwhen using the microcodes they released to address Variant 2 of the Spectre\nVulnerability for numerous processors including Broadwell, Haswell, Skylake,\nKaby Lake, Ivybridge, and Sandybridge processors. Intel has now identified\nthe root cause of these issues and determined that these microcodes may\nintroduce reboots and other unpredictable system behavior. Due to the\nseverity of the potential issues that may occur when using these microcodes,\nIntel is now recommending that customers discontinue their use. Additional\ninformation is available from Intels Security Exploit Newsroom here:\n\u003chttps://newsroom.intel.com/press-kits/security-exploits-intel-products/\u003e . \nHPE is in alignment with Intel in our recommendation that customers\ndiscontinue use of System ROMs including impacted microcodes and revert to\nearlier System ROM versions. \n\nAll System ROMs including impacted microcodes have been removed from the HPE\nSupport Site. This impacts HPE ProLiant and Synergy Gen10, Gen9, and Gen8 v2\nservers as well as HPE Superdome servers for which updated System ROMs had\npreviously been made available. Intel is working on updated microcodes to\naddress these issues, and HPE will validate updated System ROMs including\nthese microcodes and make them available to our customers in the coming\nweeks. \n\nMitigations for Variant 1 (Spectre) and Variant 3 (Meltdown) vulnerabilities\nrequire only OS updates and are not impacted. \n\n * HPE has provided a customer bulletin\n\u003chttps://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us\u003e\nwith specific instructions to obtain the udpated sytem ROM\n \n - Note:\n \n + CVE-2017-5715 (Variant 2) requires that the System ROM be updated and a\nvendor supplied operating system update be applied as well. \n + For CVE-2017-5753, CVE-2017-5754 (Variants 1 and 3) require only\nupdates of a vendor supplied operating system. \n + HPE will continue to add additional products to the list. \n\nHISTORY\n\nVersion:1 (rev.1) - 4 January 2018 Initial release\n\nVersion:2 (rev.2) - 5 January 2018 Added additional impacted products\n\nVersion:3 (rev.3) - 10 January 2018 Added more impacted products\n\nVersion:4 (rev.4) - 9 January 2018 Fixed product ID\n\nVersion:5 (rev.5) - 18 January 2018 Added additional impacted products\n\nVersion:6 (rev.6) - 19 January 2018 updated impacted product list\n\nVersion:7 (rev.7) - 23 January 2018 Marked impacted products with TBD for\nSystem ROM updates per Intel\u0027s guidance on microcode issues\n\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to [email protected]. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: [email protected]\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. ==========================================================================\nUbuntu Security Notice USN-3583-1\nFebruary 23, 2018\n\nlinux vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n\nDetails:\n\nIt was discovered that an out-of-bounds write vulnerability existed in the\nFlash-Friendly File System (f2fs) in the Linux kernel. An attacker could\nconstruct a malicious file system that, when mounted, could cause a denial\nof service (system crash) or possibly execute arbitrary code. \n(CVE-2017-0750)\n\nIt was discovered that a race condition leading to a use-after-free\nvulnerability existed in the ALSA PCM subsystem of the Linux kernel. A\nlocal attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2017-0861)\n\nIt was discovered that the KVM implementation in the Linux kernel allowed\npassthrough of the diagnostic I/O port 0x80. An attacker in a guest VM\ncould use this to cause a denial of service (system crash) in the host OS. \n(CVE-2017-1000407)\n\nBo Zhang discovered that the netlink wireless configuration interface in\nthe Linux kernel did not properly validate attributes when handling certain\nrequests. A local attacker with the CAP_NET_ADMIN could use this to cause a\ndenial of service (system crash). (CVE-2017-12153)\n\nVitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel\ndid not properly track reference counts when merging buffers. A local\nattacker could use this to cause a denial of service (memory exhaustion). \n(CVE-2017-12190)\n\nIt was discovered that the key management subsystem in the Linux kernel did\nnot properly restrict key reads on negatively instantiated keys. A local\nattacker could use this to cause a denial of service (system crash). \n(CVE-2017-12192)\n\nIt was discovered that an integer overflow existed in the sysfs interface\nfor the QLogic 24xx+ series SCSI driver in the Linux kernel. A local\nprivileged attacker could use this to cause a denial of service (system\ncrash). (CVE-2017-14051)\n\nOtto Ebeling discovered that the memory manager in the Linux kernel did not\nproperly check the effective UID in some situations. A local attacker could\nuse this to expose sensitive information. (CVE-2017-14140)\n\nIt was discovered that the ATI Radeon framebuffer driver in the Linux\nkernel did not properly initialize a data structure returned to user space. (CVE-2017-14156)\n\nChunYu Wang discovered that the iSCSI transport implementation in the Linux\nkernel did not properly validate data structures. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2017-14489)\n\nJames Patrick-Evans discovered a race condition in the LEGO USB Infrared\nTower driver in the Linux kernel. A physically proximate attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-15102)\n\nChunYu Wang discovered that a use-after-free vulnerability existed in the\nSCTP protocol implementation in the Linux kernel. A local attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code, (CVE-2017-15115)\n\nIt was discovered that the key management subsystem in the Linux kernel did\nnot properly handle NULL payloads with non-zero length values. A local\nattacker could use this to cause a denial of service (system crash). \n(CVE-2017-15274)\n\nIt was discovered that the Bluebooth Network Encapsulation Protocol (BNEP)\nimplementation in the Linux kernel did not validate the type of socket\npassed in the BNEPCONNADD ioctl(). A local attacker with the CAP_NET_ADMIN\nprivilege could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2017-15868)\n\nAndrey Konovalov discovered a use-after-free vulnerability in the USB\nserial console driver in the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2017-16525)\n\nIt was discovered that the netfilter passive OS fingerprinting (xt_osf)\nmodule did not properly perform access control checks. A local attacker\ncould improperly modify the systemwide OS fingerprint list. \n(CVE-2017-17450)\n\nIt was discovered that the HMAC implementation did not validate the state\nof the underlying cryptographic hash algorithm. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-17806)\n\nDenys Fedoryshchenko discovered a use-after-free vulnerability in the\nnetfilter xt_TCPMSS filter of the Linux kernel. A remote attacker could use\nthis to cause a denial of service (system crash). (CVE-2017-18017)\n\nGareth Evans discovered that the shm IPC subsystem in the Linux kernel did\nnot properly restrict mapping page zero. A local privileged attacker could\nuse this to execute arbitrary code. (CVE-2017-5669)\n\nIt was discovered that an integer overflow vulnerability existing in the\nIPv6 implementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (infinite loop). (CVE-2017-7542)\n\nTommi Rantala and Brad Spengler discovered that the memory manager in the\nLinux kernel did not properly enforce the CONFIG_STRICT_DEVMEM protection\nmechanism. A local attacker with access to /dev/mem could use this to\nexpose sensitive information or possibly execute arbitrary code. \n(CVE-2017-7889)\n\nMohamed Ghannam discovered a use-after-free vulnerability in the DCCP\nprotocol implementation in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-8824)\n\nMohamed Ghannam discovered a null pointer dereference in the RDS (Reliable\nDatagram Sockets) protocol implementation of the Linux kernel. A local\nattacker could use this to cause a denial of service (system crash). \n(CVE-2018-5333)\n\nee3/4ePS discovered that a race condition existed in loop block device\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2018-5344)\n\nUSN-3524-1 mitigated CVE-2017-5754 (Meltdown) for the amd64\narchitecture in Ubuntu 14.04 LTS. This update provides the\ncorresponding mitigations for the ppc64el architecture. This flaw is known as Meltdown. \n (CVE-2017-5754)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n linux-image-3.13.0-142-generic 3.13.0-142.191\n linux-image-3.13.0-142-generic-lpae 3.13.0-142.191\n linux-image-3.13.0-142-lowlatency 3.13.0-142.191\n linux-image-3.13.0-142-powerpc-e500 3.13.0-142.191\n linux-image-3.13.0-142-powerpc-e500mc 3.13.0-142.191\n linux-image-3.13.0-142-powerpc-smp 3.13.0-142.191\n linux-image-3.13.0-142-powerpc64-emb 3.13.0-142.191\n linux-image-3.13.0-142-powerpc64-smp 3.13.0-142.191\n linux-image-generic 3.13.0.142.152\n linux-image-generic-lpae 3.13.0.142.152\n linux-image-lowlatency 3.13.0.142.152\n linux-image-powerpc-e500 3.13.0.142.152\n linux-image-powerpc-e500mc 3.13.0.142.152\n linux-image-powerpc-smp 3.13.0.142.152\n linux-image-powerpc64-emb 3.13.0.142.152\n linux-image-powerpc64-smp 3.13.0.142.152\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://usn.ubuntu.com/usn/usn-3583-1\n CVE-2017-0750, CVE-2017-0861, CVE-2017-1000407, CVE-2017-12153,\n CVE-2017-12190, CVE-2017-12192, CVE-2017-14051, CVE-2017-14140,\n CVE-2017-14156, CVE-2017-14489, CVE-2017-15102, CVE-2017-15115,\n CVE-2017-15274, CVE-2017-15868, CVE-2017-16525, CVE-2017-17450,\n CVE-2017-17806, CVE-2017-18017, CVE-2017-5669, CVE-2017-5754,\n CVE-2017-7542, CVE-2017-7889, CVE-2017-8824, CVE-2018-5333,\n CVE-2018-5344\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux/3.13.0-142.191\n\n", "sources": [ { "db": "NVD", "id": "CVE-2017-5754" }, { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00303" }, { "db": "VULHUB", "id": "VHN-113957" }, { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "145769" }, { "db": "PACKETSTORM", "id": "146017" }, { "db": "PACKETSTORM", "id": "145641" }, { "db": "PACKETSTORM", "id": "147541" }, { "db": "PACKETSTORM", "id": "145658" }, { "db": "PACKETSTORM", "id": "146762" }, { "db": "PACKETSTORM", "id": "145666" }, { "db": "PACKETSTORM", "id": "146026" }, { "db": "PACKETSTORM", "id": "145795" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146534" }, { "db": "PACKETSTORM", "id": "145637" } ], "trust": 3.42 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-113957", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-113957" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5754", "trust": 3.0 }, { "db": "CERT/CC", "id": "VU#584653", "trust": 1.9 }, { "db": "CERT/CC", "id": "VU#180049", "trust": 1.9 }, { "db": "BID", "id": "102378", "trust": 1.7 }, { "db": "SECTRACK", "id": "1040071", "trust": 1.1 }, { "db": "SIEMENS", "id": "SSA-608355", "trust": 1.1 }, { "db": "LENOVO", "id": "LEN-18282", "trust": 1.1 }, { "db": "BID", "id": "106128", "trust": 1.1 }, { "db": "CERT@VDE", "id": "VDE-2018-003", "trust": 1.1 }, { "db": "CERT@VDE", "id": "VDE-2018-002", "trust": 1.1 }, { "db": "USCERT", "id": "TA18-141A", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-00303", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "145795", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "145824", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145794", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145804", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145836", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146067", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145796", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145695", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145811", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145810", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-201801-151", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-113957", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146015", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145769", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146017", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145641", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147541", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145637", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145658", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146762", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145666", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146026", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146019", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146534", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00303" }, { "db": "VULHUB", "id": "VHN-113957" }, { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "145769" }, { "db": "PACKETSTORM", "id": "146017" }, { "db": "PACKETSTORM", "id": "145641" }, { "db": "PACKETSTORM", "id": "147541" }, { "db": "PACKETSTORM", "id": "145637" }, { "db": "PACKETSTORM", "id": "145658" }, { "db": "PACKETSTORM", "id": "146762" }, { "db": "PACKETSTORM", "id": "145666" }, { "db": "PACKETSTORM", "id": "146026" }, { "db": "PACKETSTORM", "id": "145795" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146534" }, { "db": "NVD", "id": "CVE-2017-5754" } ] }, "id": "VAR-201801-1711", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-00303" }, { "db": "VULHUB", "id": "VHN-113957" } ], "trust": 1.281182788 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00303" } ] }, "last_update_date": "2024-11-29T20:58:50.283000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-113957" }, { "db": "NVD", "id": "CVE-2017-5754" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "trust": 1.9, "url": "http://www.kb.cert.org/vuls/id/584653" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/102378" }, { "trust": 1.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "trust": 1.6, "url": "https://support.apple.com//ht208394" }, { "trust": 1.6, "url": "http://www.dell.com/support/speculative-store-bypass" }, { "trust": 1.6, "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "trust": 1.2, "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "trust": 1.2, "url": "https://meltdownattack.com/" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/106128" }, { "trust": 1.1, "url": "https://www.kb.cert.org/vuls/id/180049" }, { "trust": 1.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180104-cpusidechannel" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "trust": 1.1, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2018-001.txt" }, { "trust": 1.1, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt" }, { "trust": 1.1, "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "trust": 1.1, "url": "https://aws.amazon.com/de/security/security-bulletins/aws-2018-013/" }, { "trust": 1.1, "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "trust": 1.1, "url": "https://cdrdv2.intel.com/v1/dl/getcontent/685358" }, { "trust": 1.1, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "trust": 1.1, "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "trust": 1.1, "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "trust": 1.1, "url": "https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0" }, { "trust": 1.1, "url": "https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes" }, { "trust": 1.1, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180002" }, { "trust": 1.1, "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "trust": 1.1, "url": "https://source.android.com/security/bulletin/2018-04-01" }, { "trust": 1.1, "url": "https://support.citrix.com/article/ctx231399" }, { "trust": 1.1, "url": "https://support.citrix.com/article/ctx234679" }, { "trust": 1.1, "url": "https://support.f5.com/csp/article/k91229003" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us" }, { "trust": 1.1, "url": "https://support.lenovo.com/us/en/solutions/len-18282" }, { "trust": 1.1, "url": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin" }, { "trust": 1.1, "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "trust": 1.1, "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "trust": 1.1, "url": "https://www.synology.com/support/security/synology_sa_18_01" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4078" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4082" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4120" }, { "trust": 1.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-18:03.speculative_execution.asc" }, { "trust": 1.1, "url": "https://security.gentoo.org/glsa/201810-06" }, { "trust": 1.1, "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "trust": 1.1, "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "trust": 1.1, "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2018:0292" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1040071" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/usn/usn-3522-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3522-3/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3522-4/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3523-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/usn/usn-3523-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/usn/usn-3524-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/usn/usn-3525-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3540-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3541-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3583-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3597-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3597-2/" }, { "trust": 1.0, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03871en_us" }, { "trust": 0.8, "url": "https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution" }, { "trust": 0.8, "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "trust": 0.8, "url": "https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ncas/alerts/ta18-141a" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/208.html" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf" }, { "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel" }, { "trust": 0.8, "url": "https://fortiguard.com/psirt/fg-ir-18-002" }, { "trust": 0.8, "url": "https://support.hp.com/us-en/document/c06001626" }, { "trust": 0.8, "url": "http://www.hitachi.com/hirt/publications/hirt-pub18001/" }, { "trust": 0.8, "url": "https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/" }, { "trust": 0.8, "url": "https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution" }, { "trust": 0.8, "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "trust": 0.8, "url": "https://www.suse.com/support/kb/doc/?id=7022937" }, { "trust": 0.8, "url": "https://www.synology.com/en-global/support/security/synology_sa_18_23" }, { "trust": 0.8, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/variant4" }, { "trust": 0.8, "url": "https://kb.vmware.com/s/article/54951" }, { "trust": 0.8, "url": "https://aws.amazon.com/security/security-bulletins/aws-2018-015/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5754" }, { "trust": 0.6, "url": "https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5715" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5753" }, { "trust": 0.5, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2017-5754" }, { "trust": 0.5, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.5, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2017-5753" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2017-5715" }, { "trust": 0.3, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/spectreandmeltdown" }, { "trust": 0.2, "url": "https://www.ubuntu.com/usn/usn-3541-1" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03871en_us" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.13.0-31.34" }, { "trust": 0.1, "url": "https://reviews.llvm.org/d41723)" }, { "trust": 0.1, "url": "https://reviews.freebsd.org/d13797." }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3540-2" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3540-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1011.11" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-111.134~14.04.1" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0008" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-8897" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8897" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:1349" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0011" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0022" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-18:03/speculative_execution-amd64-11.patch" }, { "trust": 0.1, "url": "https://security.freebsd.org/\u003e." }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5715\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-18:03.speculative_execution.asc\u003e" }, { "trust": 0.1, "url": "https://www.freebsd.org/handbook/kernelconfig.html\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5754\u003e" }, { "trust": 0.1, "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn\u003e" }, { "trust": 0.1, "url": "https://github.com/dag-erling/meltdown." }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-18:03/speculative_execution-amd64-11.patch.asc" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0016" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-a00039267en_us\u003e" }, { "trust": 0.1, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026langu" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us" }, { "trust": 0.1, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.1, "url": "https://www.hpe.com/info/report-security-vulnerability" }, { "trust": 0.1, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.1, "url": "https://developer.arm.com/support/security-update\u003e" }, { "trust": 0.1, "url": "http://www.amd.com/en/corporate/speculative-execution\u003e" }, { "trust": 0.1, "url": "https://newsroom.intel.com/press-kits/security-exploits-intel-products/\u003e" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-108.131~14.04.1" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3522-1" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3522-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1009.9" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3541-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.13.0-1006.8" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oem/4.13.0-1017.18" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.13.0-31.34~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.13.0-1007.10" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-0750" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12192" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12153" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5344" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14140" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7889" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14489" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000407" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-0861" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15274" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15115" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/3.13.0-142.191" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14156" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16525" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15868" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15102" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3583-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7542" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14051" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5669" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17806" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-8824" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17450" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12190" } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00303" }, { "db": "VULHUB", "id": "VHN-113957" }, { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "145769" }, { "db": "PACKETSTORM", "id": "146017" }, { "db": "PACKETSTORM", "id": "145641" }, { "db": "PACKETSTORM", "id": "147541" }, { "db": "PACKETSTORM", "id": "145637" }, { "db": "PACKETSTORM", "id": "145658" }, { "db": "PACKETSTORM", "id": "146762" }, { "db": "PACKETSTORM", "id": "145666" }, { "db": "PACKETSTORM", "id": "146026" }, { "db": "PACKETSTORM", "id": "145795" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146534" }, { "db": "NVD", "id": "CVE-2017-5754" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00303" }, { "db": "VULHUB", "id": "VHN-113957" }, { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "145769" }, { "db": "PACKETSTORM", "id": "146017" }, { "db": "PACKETSTORM", "id": "145641" }, { "db": "PACKETSTORM", "id": "147541" }, { "db": "PACKETSTORM", "id": "145637" }, { "db": "PACKETSTORM", "id": "145658" }, { "db": "PACKETSTORM", "id": "146762" }, { "db": "PACKETSTORM", "id": "145666" }, { "db": "PACKETSTORM", "id": "146026" }, { "db": "PACKETSTORM", "id": "145795" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146534" }, { "db": "NVD", "id": "CVE-2017-5754" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-21T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-01-04T00:00:00", "db": "CNVD", "id": "CNVD-2018-00303" }, { "date": "2018-01-04T00:00:00", "db": "VULHUB", "id": "VHN-113957" }, { "date": "2018-01-23T04:31:56", "db": "PACKETSTORM", "id": "146015" }, { "date": "2018-01-09T15:55:55", "db": "PACKETSTORM", "id": "145769" }, { "date": "2018-01-23T04:32:09", "db": "PACKETSTORM", "id": "146017" }, { "date": "2018-01-04T01:20:35", "db": "PACKETSTORM", "id": "145641" }, { "date": "2018-05-08T23:53:34", "db": "PACKETSTORM", "id": "147541" }, { "date": "2018-01-04T00:54:20", "db": "PACKETSTORM", "id": "145637" }, { "date": "2018-01-04T17:52:00", "db": "PACKETSTORM", "id": "145658" }, { "date": "2018-03-14T14:01:12", "db": "PACKETSTORM", "id": "146762" }, { "date": "2018-01-04T17:53:07", "db": "PACKETSTORM", "id": "145666" }, { "date": "2018-01-24T00:28:48", "db": "PACKETSTORM", "id": "146026" }, { "date": "2018-01-10T00:58:19", "db": "PACKETSTORM", "id": "145795" }, { "date": "2018-01-23T04:32:21", "db": "PACKETSTORM", "id": "146019" }, { "date": "2018-02-23T16:10:12", "db": "PACKETSTORM", "id": "146534" }, { "date": "2018-01-04T13:29:00.303000", "db": "NVD", "id": "CVE-2017-5754" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-19T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-01-11T00:00:00", "db": "CNVD", "id": "CNVD-2018-00303" }, { "date": "2021-11-19T00:00:00", "db": "VULHUB", "id": "VHN-113957" }, { "date": "2024-11-21T03:28:19.677000", "db": "NVD", "id": "CVE-2017-5754" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "146017" }, { "db": "PACKETSTORM", "id": "145795" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146534" } ], "trust": 0.5 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks", "sources": [ { "db": "CERT/CC", "id": "VU#180049" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "info disclosure", "sources": [ { "db": "PACKETSTORM", "id": "146026" } ], "trust": 0.1 } }
var-202202-1348
Vulnerability from variot
Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access. Intel(R) AMT SDK , SCS , MEBx There are vulnerabilities in inadequate protection of credentials.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1348", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "core i3-10100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10310u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9960x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 8565u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1060g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9 9900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 8700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9 9900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 8700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10980xe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 8600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "management engine bios extension", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "14.0.0.0004" }, { "model": "core i9-10900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 8400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 8560u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 9700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-8950hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9 9980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 1065g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 8350k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 9100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10305", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1068ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 9400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10610u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 9350k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10305t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 9700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9 9900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 9400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10110y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 8400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900ks", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10810u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 9600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 m480", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 8300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 8700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10850k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 1068ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 8086k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9 9900ks", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10505", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10325", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9940x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10920x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 8559u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 l16g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 1060g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9 9900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "setup and configuration software", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "12.2" }, { "model": "core i3-1005g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-7980xe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5\\+8400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7\\+8700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 8100f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10610u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 9300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10910", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 8100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 9100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "management engine bios extension", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "12.0.0.0011" }, { "model": "core i7 8550u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 8500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9880h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 9400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 8100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 9600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 9300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 9500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 9700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 10310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9920x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-7920x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10885h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 9320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1065g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-7960x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 8600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 9600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 9500f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 8500y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "active management technology software development kit", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "16.0.3" }, { "model": "core i7-10870h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "management engine bios extension", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "15.0.0.0004" }, { "model": "management engine bios extension", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "11.0.0.0012" }, { "model": "core i5-1030ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 9350kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-7940x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1038ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 1060ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 9700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9 9880h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 8500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9820x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 9700f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-7900x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 10510y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5\\+8500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10110y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10940x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10875h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10110u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10200h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 10110y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7 8650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000ng4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 9600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 9100f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1060ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10750h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10710u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 10210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 9500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9800x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9980xe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5 8600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3 8300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "intel active management technology software development kit", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel core i3-10100e", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel core i3-1000g4", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel core i3-1000g1", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel management engine bios extension", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel setup and configuration software", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel core i3-1005g1", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel core i3-10100f", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel core i3-10100", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel core i3", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005402" }, { "db": "NVD", "id": "CVE-2021-33107" } ] }, "cve": "CVE-2021-33107", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-33107", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-393121", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2021-33107", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.6, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-33107", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2021-33107", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-33107", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202202-677", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-393121", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-393121" }, { "db": "JVNDB", "id": "JVNDB-2022-005402" }, { "db": "CNNVD", "id": "CNNVD-202202-677" }, { "db": "NVD", "id": "CVE-2021-33107" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access. Intel(R) AMT SDK , SCS , MEBx There are vulnerabilities in inadequate protection of credentials.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-33107" }, { "db": "JVNDB", "id": "JVNDB-2022-005402" }, { "db": "VULHUB", "id": "VHN-393121" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-33107", "trust": 3.3 }, { "db": "JVN", "id": "JVNVU99045838", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-005402", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2022020924", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-75197", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0538", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202202-677", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-393121", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-393121" }, { "db": "JVNDB", "id": "JVNDB-2022-005402" }, { "db": "CNNVD", "id": "CNNVD-202202-677" }, { "db": "NVD", "id": "CVE-2021-33107" } ] }, "id": "VAR-202202-1348", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-393121" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:04:53.756000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00575 Intel\u00a0Product\u00a0Security\u00a0Center", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html" }, { "title": "Intel Various product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=182456" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005402" }, { "db": "CNNVD", "id": "CNNVD-202202-677" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "Inadequate protection of credentials (CWE-522) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-393121" }, { "db": "JVNDB", "id": "JVNDB-2022-005402" }, { "db": "NVD", "id": "CVE-2021-33107" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33107" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu99045838/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022020924" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0538" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-75197" } ], "sources": [ { "db": "VULHUB", "id": "VHN-393121" }, { "db": "JVNDB", "id": "JVNDB-2022-005402" }, { "db": "CNNVD", "id": "CNNVD-202202-677" }, { "db": "NVD", "id": "CVE-2021-33107" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-393121" }, { "db": "JVNDB", "id": "JVNDB-2022-005402" }, { "db": "CNNVD", "id": "CNNVD-202202-677" }, { "db": "NVD", "id": "CVE-2021-33107" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-393121" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005402" }, { "date": "2022-02-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-677" }, { "date": "2022-02-09T23:15:15.387000", "db": "NVD", "id": "CVE-2021-33107" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-28T00:00:00", "db": "VULHUB", "id": "VHN-393121" }, { "date": "2023-05-30T06:30:00", "db": "JVNDB", "id": "JVNDB-2022-005402" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-677" }, { "date": "2022-07-28T09:30:06.003000", "db": "NVD", "id": "CVE-2021-33107" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Intel\u00a0 Insufficient Protection of Credentials in Products Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005402" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-677" } ], "trust": 0.6 } }
var-201906-0926
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. An information disclosure vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0926", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0183" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "cve": "CVE-2019-0183", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-0183", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140214", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2019-0183", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0183", "trust": 1.0, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201906-574", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-140214", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140214" }, { "db": "CNNVD", "id": "CNNVD-201906-574" }, { "db": "NVD", "id": "CVE-2019-0183" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. An information disclosure vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-0183" }, { "db": "VULHUB", "id": "VHN-140214" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0183", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-574", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140214", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140214" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-574" }, { "db": "NVD", "id": "CVE-2019-0183" } ] }, "id": "VAR-201906-0926", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140214" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T21:15:03Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140214" }, { "db": "NVD", "id": "CVE-2019-0183" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140214" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-574" }, { "db": "NVD", "id": "CVE-2019-0183" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140214" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-574" }, { "db": "NVD", "id": "CVE-2019-0183" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140214" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-574" }, { "date": "2019-06-13T16:29:01.233000", "db": "NVD", "id": "CVE-2019-0183" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140214" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-574" }, { "date": "2024-11-21T04:16:25.627000", "db": "NVD", "id": "CVE-2019-0183" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-574" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-574" } ], "trust": 0.6 } }
var-201803-1853
Vulnerability from variot
Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope. Intel Systems with microprocessors contain information disclosure vulnerabilities.Information may be obtained. Intel Atom C C2308 is a central processing unit (CPU) product of Intel Corporation of the United States. The ARM Cortex-A 75 is an implementation of the Cortex-A75 microarchitecture from the British company ARM. The following products and versions are affected: Intel Atom C C2308; Xeon Silver 4110; Xeon Silver 4112; Xeon Silver 4116; ARM Cortex-A 75, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1853", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2508" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2358" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2530" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2518" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2350" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2316" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2338" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2538" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2308" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2516" }, { "model": "xeon e5 2650l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "720qm" }, { "model": "xeon e3 1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7235" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6585r" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3710" }, { "model": "xeon e5 2430l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210m" }, { "model": "xeon e3 1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10c" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5550" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6154" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "740qm" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6510" }, { "model": "xeon e3 1225 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3235rk" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4720hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4000m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2405s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2435m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3380m" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1545m_v5" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360" }, { "model": "xeon e5 2637", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3317u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700ec" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "460m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4807" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "15" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3480" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3580" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y32" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5677" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330m" }, { "model": "xeon e3 1278l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x6550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5750hq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570r" }, { "model": "xeon e3 1265l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2760qm" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134m" }, { "model": "xeon e5 2430 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "650" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3295rk" }, { "model": "xeon e3 1280 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4109t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5550u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3690" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v2" }, { "model": "xeon e5 2603 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "57" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6260u" }, { "model": "xeon e5 2620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1281 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660" }, { "model": "xeon e5 2450l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735d" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2340ue" }, { "model": "xeon e5 2630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867l" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5618" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y30" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775c" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8180" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460" }, { "model": "xeon e3 1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2650l_v4" }, { "model": "xeon e5 2420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675c" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v2" }, { "model": "xeon e5 2648l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5557u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v3" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3445" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3455" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2629m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3700" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138f" }, { "model": "xeon e5 2438l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5257u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5502" }, { "model": "xeon bronze 3106", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2480" }, { "model": "xeon e5 2470 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600t" }, { "model": "xeon e5 2407 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2450 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2675qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2940" }, { "model": "xeon e5 2609 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350k" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1850" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460t" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7285" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460s" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2900" }, { "model": "xeon e5 2609 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2550" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3808" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3350" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5200u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4260u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5506" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126f" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4750hq" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1515m_v5" }, { "model": "xeon e3 1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qm" }, { "model": "xeon e5 2418l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4722hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5500u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8650u" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3205rk" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v5" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2540m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5650" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3720qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210" }, { "model": "core m7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y75" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3785" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820eq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3827" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2102" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610me" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1800" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330e" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3010" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "470um" }, { "model": "xeon e5 1428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v3" }, { "model": "xeon e5 2430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4890_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5649" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "610e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370t" }, { "model": "xeon e5 2428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2640 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667" }, { "model": "xeon e5 2618l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2300" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "530" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660lm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5690" }, { "model": "xeon e5 2643 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2390t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4105" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2515e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3530" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4880_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176f" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1565l_v5" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4648_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600u" }, { "model": "xeon e5 1660 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2467m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850hq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5680" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8857_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8837" }, { "model": "xeon e5 2620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4800mq" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2830" }, { "model": "xeon e3 1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3406" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4628l_v4" }, { "model": "xeon e5 2618l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3480" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2665" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v2" }, { "model": "xeon e3 1220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500t" }, { "model": "xeon e5 2630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2550k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3689y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700hq" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3538" }, { "model": "xeon e3 1265l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5672" }, { "model": "xeon e5 1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hk" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v2" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3570" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3350p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3440" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3560" }, { "model": "xeon e5 1680 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3437u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300y" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3460" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3355" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6157u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5667" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160f" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4624l_v2" }, { "model": "xeon e5 1650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140m" }, { "model": "xeon e3 1268l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4550u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2520" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200u" }, { "model": "xeon e5 2608l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2803" }, { "model": "xeon e5 2643 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5518" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980x" }, { "model": "xeon e5 1620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3308" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y51" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4250u" }, { "model": "xeon e5 2637 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770r" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3955" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2357m" }, { "model": "xeon e3 1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hq" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2460" }, { "model": "xeon e3 1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8158" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6006u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4158u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217ue" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2750" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585l_v5" }, { "model": "xeon e5 2408l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3758" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3360m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7530" }, { "model": "xeon e5 1650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2348m" }, { "model": "xeon e3 1275 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v2" }, { "model": "xeon e3 1240 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v2" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3229y" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3845" }, { "model": "xeon e3 1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702ec" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650" }, { "model": "xeon e5 2637 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620ue" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5503" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6200u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4510u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5640" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200m" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y71" }, { "model": "xeon e5 2630l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5122" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2370m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3427u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5575r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4558u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710mq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8168" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2630qm" }, { "model": "xeon e3 1241 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4422e" }, { "model": "xeon e3 1230l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2312m" }, { "model": "xeon e3 1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7555" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700" }, { "model": "xeon e3 1271 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3635qm" }, { "model": "xeon e3 1260l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6167u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330te" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134" }, { "model": "xeon e3 1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7567u" }, { "model": "xeon e5 1650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "965" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3115c" }, { "model": "xeon e3 1245 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5670" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2738" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940xm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3430" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660ue" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "975" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5675" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450m" }, { "model": "xeon e3 1240 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658" }, { "model": "xeon e5 2623 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qm" }, { "model": "xeon e3 1285 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4000" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3470" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4760hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "990x" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200h" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8600k" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6146" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4960hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v3" }, { "model": "xeon e5 2628l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v3" }, { "model": "xeon e5 2630 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3590" }, { "model": "xeon e5 1428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v3" }, { "model": "xeon e5 2448l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5549" }, { "model": "xeon e5 2428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745d" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7545" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850eq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5508" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2560" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2758" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120me" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7560u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5509" }, { "model": "xeon e5 2637 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y75" }, { "model": "xeon e3 1285l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3958" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6102e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4302y" }, { "model": "xeon e5 2418l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3805" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3825" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770d" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3337u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3508" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8153" }, { "model": "xeon e5 2603 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5118" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2910" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3405" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2657m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5250u" }, { "model": "xeon e3 1286l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1660 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5115" }, { "model": "xeon e3 12201 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590t" }, { "model": "xeon e5 2640 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "880" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3820qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2520m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650u" }, { "model": "xeon e3 1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5640" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4005" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3826" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2367m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3740qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2808" }, { "model": "xeon e3 1225 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5647" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4980hq" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3710" }, { "model": "xeon e3 1240l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "73" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2715qe" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4020y" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3460" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2130" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3670" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "17" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v2" }, { "model": "xeon e5 2430l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2718" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2610ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "390m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v3" }, { "model": "xeon e5 2448l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4025u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6360u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7920hq" }, { "model": "xeon e5 2407", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870hq" }, { "model": "xeon e3 1275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v3" }, { "model": "xeon e3 1270 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "930" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2655le" }, { "model": "xeon e3 1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2807" }, { "model": "xeon e3 1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y31" }, { "model": "xeon e5 2618l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v2" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "9" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8550u" }, { "model": "xeon e3 1220 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5506" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920xm" }, { "model": "xeon e3 1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3630qm" }, { "model": "xeon e5 2450l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670k" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2840" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7542" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620m" }, { "model": "xeon e3 1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2410m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400t" }, { "model": "xeon e5 1620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3130" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3339y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2620m" }, { "model": "xeon e3 1276 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1558l_v5" }, { "model": "xeon e3 1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4108" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2960xm" }, { "model": "xeon e5 2650l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "840qm" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699r_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4400e" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6152" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3815" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v4" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2920" }, { "model": "xeon e5 1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6685r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770s" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2815" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230f" }, { "model": "xeon e3 1220l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "970" }, { "model": "xeon e3 1230 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3225" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "875k" }, { "model": "xeon e3 1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350h" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1578l_v5" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3840qm" }, { "model": "xeon e3 1226 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v6" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4308u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2920xm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3338" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712mq" }, { "model": "xeon e5 1428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3230m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2720qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3227u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740d" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2930" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5539" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5157u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8164" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658a_v3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690" }, { "model": "xeon e5 2648l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2380p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5528" }, { "model": "xeon e3 1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700mq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5606" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4005u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640lm" }, { "model": "xeon e5 2628l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y57" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "820qm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3450" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600k" }, { "model": "xeon e3 1285 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2730" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3426" }, { "model": "xeon e3 12201", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v4" }, { "model": "xeon e5 2418l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3475s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340te" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2637m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3750" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120m" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1750" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "580m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5540" }, { "model": "xeon e5 1630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6136" }, { "model": "xeon e5 2450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699a_v4" }, { "model": "xeon e5 2403", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4785t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2375m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860hq" }, { "model": "xeon e3 1270 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3200rk" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770te" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585_v5" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "670" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "960" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6128" }, { "model": "xeon e5 2403 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440eq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2700k" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3230rk" }, { "model": "xeon e3 1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7540" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v2" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2649m" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4205" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2580" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6402p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8830" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7295" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5660" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660um" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2617m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697a_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870" }, { "model": "xeon e3 1245 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3667u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v3" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2806" }, { "model": "xeon e5 1630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775r" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736f" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2557m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4578u" }, { "model": "xeon e5 2470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6144" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3050" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "350m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030u" }, { "model": "xeon e5 2648l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5645" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5590" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4910mq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6287u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100u" }, { "model": "xeon e3 1220 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-1105c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v3" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "75" }, { "model": "xeon e3 1258l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4202y" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100h" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2320" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8250u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3858" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610m" }, { "model": "xeon e3 1235", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650l" }, { "model": "xeon e3 1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3520m" }, { "model": "xeon e5 2640 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7660u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4410e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5638" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1575m_v5" }, { "model": "xeon e3 1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750" }, { "model": "xeon e5 2609 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "370m" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2810" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1900" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2430m" }, { "model": "xeon e5 1620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210f" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6132" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5630" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2890_v2" }, { "model": "xeon e5 1660 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4200" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v4" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5607" }, { "model": "xeon e3 1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4012y" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y70" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4771" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520e" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3520" }, { "model": "xeon e5 2420 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6540" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5518" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5650u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620um" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5620" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "480m" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775d" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620lm" }, { "model": "xeon e3 1246 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1265l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4278u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3130m" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230" }, { "model": "xeon e3 1275l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2640m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5119t" }, { "model": "xeon e5 2623 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2125" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2805" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4657l_v2" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y30" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517ue" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5570" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5520" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3320m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3245" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2420" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2510e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3632qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710hq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6150" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3687u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5015u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6267u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300u" }, { "model": "xeon e3 1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1285l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v4" }, { "model": "xeon e3 1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4765t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3830" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670t" }, { "model": "xeon e5 1660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3680" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5287u" }, { "model": "xeon e5 2630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v3" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2635qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670r" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300" }, { "model": "xeon e3 1230 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v4" }, { "model": "xeon e5 2440 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5603" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "655k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4102e" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1505m_v6" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4810mq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8400" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5609" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210h" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3708" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6442eq" }, { "model": "xeon e3 1290 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2648l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1680 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3439y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2365m" }, { "model": "xeon e3 1231 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8156" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6098p" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5504" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4288u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4900mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5630" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2537m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3555le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350u" }, { "model": "xeon e3 1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5020u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "661" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2677m" }, { "model": "xeon e5 2628l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3510" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "72" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8894_v4" }, { "model": "xeon e3 1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4258u" }, { "model": "xeon e5 2609", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5507" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2820" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680" }, { "model": "xeon e5 2640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5010u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4617" }, { "model": "xeon e3 1280 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2377m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2115c" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2710qe" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5580" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4120u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2350m" }, { "model": "xeon e3 1105c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4220y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500te" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7560" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6350hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430s" }, { "model": "xeon e3 1286 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3450" }, { "model": "xeon bronze 3104", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1290", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2880_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6320" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5005u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680um" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3795" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "450m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702hq" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10a" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5687" }, { "model": "xeon e3 1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v4" }, { "model": "xeon e5 2620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330e" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y54" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2328m" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380um" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2105" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3150" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3000" }, { "model": "xeon e5 2608l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440hq" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3265rk" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3537u" }, { "model": "cortex-a", "scope": null, "trust": 0.8, "vendor": "arm", "version": null }, { "model": "atom c", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom z", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003454" }, { "db": "CNNVD", "id": "CNNVD-201803-955" }, { "db": "NVD", "id": "CVE-2018-9056" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:arm:cortex-a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_c", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_x3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_z", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:celeron_j", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:celeron_n", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003454" } ] }, "cve": "CVE-2018-9056", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2018-9056", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-139088", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2018-9056", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2018-9056", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-9056", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201803-955", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-139088", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-9056", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-139088" }, { "db": "VULMON", "id": "CVE-2018-9056" }, { "db": "JVNDB", "id": "JVNDB-2018-003454" }, { "db": "CNNVD", "id": "CNNVD-201803-955" }, { "db": "NVD", "id": "CVE-2018-9056" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope. Intel Systems with microprocessors contain information disclosure vulnerabilities.Information may be obtained. Intel Atom C C2308 is a central processing unit (CPU) product of Intel Corporation of the United States. The ARM Cortex-A 75 is an implementation of the Cortex-A75 microarchitecture from the British company ARM. The following products and versions are affected: Intel Atom C C2308; Xeon Silver 4110; Xeon Silver 4112; Xeon Silver 4116; ARM Cortex-A 75, etc", "sources": [ { "db": "NVD", "id": "CVE-2018-9056" }, { "db": "JVNDB", "id": "JVNDB-2018-003454" }, { "db": "VULHUB", "id": "VHN-139088" }, { "db": "VULMON", "id": "CVE-2018-9056" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-9056", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-003454", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201803-955", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-139088", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-9056", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-139088" }, { "db": "VULMON", "id": "CVE-2018-9056" }, { "db": "JVNDB", "id": "JVNDB-2018-003454" }, { "db": "CNNVD", "id": "CNNVD-201803-955" }, { "db": "NVD", "id": "CVE-2018-9056" } ] }, "id": "VAR-201803-1853", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-139088" } ], "trust": 0.6 }, "last_update_date": "2024-11-23T22:22:11.353000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cortex-A Series", "trust": 0.8, "url": "https://www.arm.com/products/processors/cortex-a" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.intel.com" }, { "title": "Red Hat: CVE-2018-9056", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2018-9056" }, { "title": "Hardware-and-Firmware-Security-Guidance", "trust": 0.1, "url": "https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance " }, { "title": "Firmware-Security", "trust": 0.1, "url": "https://github.com/virusbeeE/Firmware-Security " }, { "title": "hardware-attacks-state-of-the-art", "trust": 0.1, "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-9056" }, { "db": "JVNDB", "id": "JVNDB-2018-003454" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-139088" }, { "db": "JVNDB", "id": "JVNDB-2018-003454" }, { "db": "NVD", "id": "CVE-2018-9056" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf" }, { "trust": 2.6, "url": "https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-9056" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-9056" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2018-9056" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-9056" }, { "trust": 0.1, "url": "https://github.com/nsacyber/hardware-and-firmware-security-guidance" } ], "sources": [ { "db": "VULHUB", "id": "VHN-139088" }, { "db": "VULMON", "id": "CVE-2018-9056" }, { "db": "JVNDB", "id": "JVNDB-2018-003454" }, { "db": "CNNVD", "id": "CNNVD-201803-955" }, { "db": "NVD", "id": "CVE-2018-9056" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-139088" }, { "db": "VULMON", "id": "CVE-2018-9056" }, { "db": "JVNDB", "id": "JVNDB-2018-003454" }, { "db": "CNNVD", "id": "CNNVD-201803-955" }, { "db": "NVD", "id": "CVE-2018-9056" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-27T00:00:00", "db": "VULHUB", "id": "VHN-139088" }, { "date": "2018-03-27T00:00:00", "db": "VULMON", "id": "CVE-2018-9056" }, { "date": "2018-05-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003454" }, { "date": "2018-03-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-955" }, { "date": "2018-03-27T17:29:00.820000", "db": "NVD", "id": "CVE-2018-9056" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-05T00:00:00", "db": "VULHUB", "id": "VHN-139088" }, { "date": "2020-05-05T00:00:00", "db": "VULMON", "id": "CVE-2018-9056" }, { "date": "2018-05-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003454" }, { "date": "2022-03-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-955" }, { "date": "2024-11-21T04:14:52.893000", "db": "NVD", "id": "CVE-2018-9056" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-955" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Information disclosure vulnerability in systems with microprocessors", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003454" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-955" } ], "trust": 0.6 } }
var-201906-0917
Vulnerability from variot
Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Intel Dual Band Wireless-AC 8260 contains a denial-of-service (DoS) vulnerability (CWE-400). Yusuke Ogawa of Cisco Systems G.K. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker may be able to cause a denial-of-service (DoS). IntelPROSet/WirelessWiFiSoftwaredriver is a wireless network card driver from Intel Corporation of the United States. The vulnerability stems from a network system or product that does not properly restrict access to resources from unauthorized roles that an attacker could use to cause a denial of service. Intel PROSet/Wireless WiFi Software driver是美国英特尔(Intel)公司的一款无线网卡驱动程序. Intel PROSet/Wireless WiFi Software driver 21.10之前版本中存在访问控制错误漏洞。该漏洞源于网络系统或产品未正确限制来自未授权角色的资源访问。以下产品及版本受到影响:Intel Dual Band Wireless-AC 3160;Dual Band Wireless-AC 7260;Dual Band Wireless-N 7260;Wireless-N 7260;Dual Band Wireless-AC 7260 for Desktop;Dual Band Wireless-AC 7265 (Rev. C);Dual Band Wireless-N 7265 (Rev. C);Wireless-N 7265 (Rev. C);Dual Band Wireless-AC 3165;Dual Band Wireless-AC 7265 (Rev. D);Dual Band Wireless-N 7265 (Rev. D);Wireless-N 7265 (Rev. D);Dual Band Wireless-AC 3168;Tri-Band Wireless-AC 17265;Dual Band Wireless-AC 8260;Tri-Band Wireless-AC 18260;Dual Band Wireless-AC 8265;Dual Band Wireless-AC 8265 Desktop Kit;Tri-Band Wireless-AC 18265;Wireless-AC 9560;Wireless-AC 9461;Wireless-AC 9462;Wireless-AC 9260;Wi-Fi 6 AX200;Wi-Fi 6 AX201. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. (CVE-2019-11477)
Jonathan Looney discovered that the TCP retransmission queue implementation in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. (CVE-2019-14835)
Update instructions:
The problem can be corrected by updating your livepatches to the following versions:
| Kernel | Version | flavors | |--------------------------+----------+--------------------------| | 4.4.0-148.174 | 58.1 | lowlatency, generic | | 4.4.0-148.174~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-150.176 | 58.1 | generic, lowlatency | | 4.4.0-150.176~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-151.178 | 58.1 | lowlatency, generic | | 4.4.0-151.178~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-154.181 | 58.1 | lowlatency, generic | | 4.4.0-154.181~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-157.185 | 58.1 | lowlatency, generic | | 4.4.0-157.185~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-159.187 | 58.1 | lowlatency, generic | | 4.4.0-159.187~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-161.189 | 58.1 | lowlatency, generic | | 4.4.0-161.189~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-164.192 | 58.1 | lowlatency, generic | | 4.4.0-164.192~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-165.193 | 58.1 | generic, lowlatency | | 4.4.0-1083.93 | 58.1 | aws | | 4.4.0-1084.94 | 58.1 | aws | | 4.4.0-1085.96 | 58.1 | aws | | 4.4.0-1087.98 | 58.1 | aws | | 4.4.0-1088.99 | 58.1 | aws | | 4.4.0-1090.101 | 58.1 | aws | | 4.4.0-1092.103 | 58.1 | aws | | 4.4.0-1094.105 | 58.1 | aws | | 4.15.0-50.54 | 58.1 | generic, lowlatency | | 4.15.0-50.54~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-51.55 | 58.1 | generic, lowlatency | | 4.15.0-51.55~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-52.56 | 58.1 | lowlatency, generic | | 4.15.0-52.56~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-54.58 | 58.1 | generic, lowlatency | | 4.15.0-54.58~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-55.60 | 58.1 | generic, lowlatency | | 4.15.0-58.64 | 58.1 | generic, lowlatency | | 4.15.0-58.64~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-60.67 | 58.1 | lowlatency, generic | | 4.15.0-60.67~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-62.69 | 58.1 | generic, lowlatency | | 4.15.0-62.69~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-64.73 | 58.1 | generic, lowlatency | | 4.15.0-64.73~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-65.74 | 58.1 | lowlatency, generic | | 4.15.0-1038.43 | 58.1 | oem | | 4.15.0-1039.41 | 58.1 | aws | | 4.15.0-1039.44 | 58.1 | oem | | 4.15.0-1040.42 | 58.1 | aws | | 4.15.0-1041.43 | 58.1 | aws | | 4.15.0-1043.45 | 58.1 | aws | | 4.15.0-1043.48 | 58.1 | oem | | 4.15.0-1044.46 | 58.1 | aws | | 4.15.0-1045.47 | 58.1 | aws | | 4.15.0-1045.50 | 58.1 | oem | | 4.15.0-1047.49 | 58.1 | aws | | 4.15.0-1047.51 | 58.1 | azure | | 4.15.0-1048.50 | 58.1 | aws | | 4.15.0-1049.54 | 58.1 | azure | | 4.15.0-1050.52 | 58.1 | aws | | 4.15.0-1050.55 | 58.1 | azure | | 4.15.0-1050.57 | 58.1 | oem | | 4.15.0-1051.53 | 58.1 | aws | | 4.15.0-1051.56 | 58.1 | azure | | 4.15.0-1052.57 | 58.1 | azure | | 4.15.0-1055.60 | 58.1 | azure | | 4.15.0-1056.61 | 58.1 | azure | | 4.15.0-1056.65 | 58.1 | oem | | 4.15.0-1057.62 | 58.1 | azure | | 4.15.0-1057.66 | 58.1 | oem | | 4.15.0-1059.64 | 58.1 | azure | | 5.0.0-1014.14~18.04.1 | 58.1 | azure | | 5.0.0-1016.17~18.04.1 | 58.1 | azure | | 5.0.0-1018.19~18.04.1 | 58.1 | azure | | 5.0.0-1020.21~18.04.1 | 58.1 | azure |
Support Information:
Kernels older than the levels listed below do not receive livepatch updates. Please upgrade your kernel as soon as possible.
| Series | Version | Flavors | |------------------+------------------+--------------------------| | Ubuntu 18.04 LTS | 4.15.0-1039 | aws | | Ubuntu 16.04 LTS | 4.4.0-1083 | aws | | Ubuntu 18.04 LTS | 5.0.0-1000 | azure | | Ubuntu 16.04 LTS | 4.15.0-1047 | azure | | Ubuntu 18.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 16.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 14.04 LTS | 4.4.0-148 | generic lowlatency | | Ubuntu 18.04 LTS | 4.15.0-1038 | oem | | Ubuntu 16.04 LTS | 4.4.0-148 | generic lowlatency |
References: CVE-2016-10905, CVE-2018-20856, CVE-2018-20961, CVE-2018-20976, CVE-2018-21008, CVE-2019-0136, CVE-2019-2054, CVE-2019-2181, CVE-2019-3846, CVE-2019-10126, CVE-2019-10207, CVE-2019-11477, CVE-2019-11478, CVE-2019-11833, CVE-2019-12614, CVE-2019-14283, CVE-2019-14284, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, CVE-2019-14821, CVE-2019-14835
-- ubuntu-security-announce mailing list [email protected] Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . ========================================================================= Ubuntu Security Notice USN-4118-1 September 02, 2019
linux-aws vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
Details:
It was discovered that the alarmtimer implementation in the Linux kernel contained an integer overflow vulnerability. (CVE-2018-13053)
Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly track inode validations. (CVE-2018-13093)
Wen Xu discovered that the f2fs file system implementation in the Linux kernel did not properly validate metadata. (CVE-2018-13096, CVE-2018-13097, CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14615, CVE-2018-14616)
Wen Xu and Po-Ning Tseng discovered that btrfs file system implementation in the Linux kernel did not properly validate metadata. (CVE-2018-14609, CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613)
Wen Xu discovered that the HFS+ filesystem implementation in the Linux kernel did not properly handle malformed catalog data in some situations. (CVE-2018-14617)
Vasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem of the Linux kernel did not properly initialize new files in some situations. A local attacker could use this to expose sensitive information. (CVE-2018-16862)
Hui Peng and Mathias Payer discovered that the Option USB High Speed driver in the Linux kernel did not properly validate metadata received from the device. (CVE-2018-19985)
Hui Peng and Mathias Payer discovered that the USB subsystem in the Linux kernel did not properly handle size checks when handling an extra USB descriptor. (CVE-2018-20169)
Zhipeng Xie discovered that an infinite loop could triggered in the CFS Linux kernel process scheduler. (CVE-2018-20784)
It was discovered that a use-after-free error existed in the block layer subsystem of the Linux kernel when certain failure conditions occurred. (CVE-2018-20856)
Eli Biham and Lior Neumann discovered that the Bluetooth implementation in the Linux kernel did not properly validate elliptic curve parameters during Diffie-Hellman key exchange in some situations. An attacker could use this to expose sensitive information. (CVE-2018-5383)
It was discovered that the Intel wifi device driver in the Linux kernel did not properly validate certain Tunneled Direct Link Setup (TDLS). (CVE-2019-0136)
It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. (CVE-2019-10126)
It was discovered that the Bluetooth UART implementation in the Linux kernel did not properly check for missing tty operations. (CVE-2019-10207)
Amit Klein and Benny Pinkas discovered that the Linux kernel did not sufficiently randomize IP ID values generated for connectionless networking protocols. A remote attacker could use this to track particular Linux devices. (CVE-2019-10638)
Amit Klein and Benny Pinkas discovered that the location of kernel addresses could exposed by the implementation of connection-less network protocols in the Linux kernel. A remote attacker could possibly use this to assist in the exploitation of another vulnerability in the Linux kernel. (CVE-2019-10639)
Adam Zabrocki discovered that the Intel i915 kernel mode graphics driver in the Linux kernel did not properly restrict mmap() ranges in some situations. (CVE-2019-11085)
It was discovered that an integer overflow existed in the Linux kernel when reference counting pages, leading to potential use-after-free issues. (CVE-2019-11487)
Jann Horn discovered that a race condition existed in the Linux kernel when performing core dumps. (CVE-2019-11599)
It was discovered that a null pointer dereference vulnerability existed in the LSI Logic MegaRAID driver in the Linux kernel. (CVE-2019-11810)
It was discovered that a race condition leading to a use-after-free existed in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel. The RDS protocol is blacklisted by default in Ubuntu. (CVE-2019-11815)
It was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833)
It was discovered that the Bluetooth Human Interface Device Protocol (HIDP) implementation in the Linux kernel did not properly verify strings were NULL terminated in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11884)
It was discovered that a NULL pointer dereference vulnerabilty existed in the Near-field communication (NFC) implementation in the Linux kernel. (CVE-2019-12818)
It was discovered that the MDIO bus devices subsystem in the Linux kernel improperly dropped a device reference in an error condition, leading to a use-after-free. (CVE-2019-12819)
It was discovered that a NULL pointer dereference vulnerability existed in the Near-field communication (NFC) implementation in the Linux kernel. (CVE-2019-12984)
Jann Horn discovered a use-after-free vulnerability in the Linux kernel when accessing LDT entries in some situations. (CVE-2019-13233)
Jann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. (CVE-2019-13272)
It was discovered that the GTCO tablet input driver in the Linux kernel did not properly bounds check the initial HID report sent by the device. (CVE-2019-13631)
It was discovered that the floppy driver in the Linux kernel did not properly validate meta data, leading to a buffer overread. (CVE-2019-14283)
It was discovered that the floppy driver in the Linux kernel did not properly validate ioctl() calls, leading to a division-by-zero. (CVE-2019-14284)
Tuba Yavuz discovered that a race condition existed in the DesignWare USB3 DRD Controller device driver in the Linux kernel. (CVE-2019-14763)
It was discovered that an out-of-bounds read existed in the QLogic QEDI iSCSI Initiator Driver in the Linux kernel. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2019-15090)
It was discovered that the Raremono AM/FM/SW radio device driver in the Linux kernel did not properly allocate memory, leading to a use-after-free. (CVE-2019-15211)
It was discovered at a double-free error existed in the USB Rio 500 device driver for the Linux kernel. (CVE-2019-15212)
It was discovered that a race condition existed in the Advanced Linux Sound Architecture (ALSA) subsystem of the Linux kernel, leading to a potential use-after-free. (CVE-2019-15214)
It was discovered that a race condition existed in the CPiA2 video4linux device driver for the Linux kernel, leading to a use-after-free. (CVE-2019-15215)
It was discovered that a race condition existed in the Softmac USB Prism54 device driver in the Linux kernel. (CVE-2019-15220)
It was discovered that a use-after-free vulnerability existed in the Appletalk implementation in the Linux kernel if an error occurs during initialization. (CVE-2019-15292)
It was discovered that the Empia EM28xx DVB USB device driver implementation in the Linux kernel contained a use-after-free vulnerability when disconnecting the device. (CVE-2019-2024)
It was discovered that the USB video device class implementation in the Linux kernel did not properly validate control bits, resulting in an out of bounds buffer read. A local attacker could use this to possibly expose sensitive information (kernel memory). (CVE-2019-2101)
It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. (CVE-2019-3846)
Jason Wang discovered that an infinite loop vulnerability existed in the virtio net driver in the Linux kernel. (CVE-2019-3900)
Daniele Antonioli, Nils Ole Tippenhauer, and Kasper B. Rasmussen discovered that the Bluetooth protocol BR/EDR specification did not properly require sufficiently strong encryption key lengths. A physicall proximate attacker could use this to expose sensitive information. (CVE-2019-9506)
It was discovered that the Appletalk IP encapsulation driver in the Linux kernel did not properly prevent kernel addresses from being copied to user space. A local attacker with the CAP_NET_ADMIN capability could use this to expose sensitive information. (CVE-2018-20511)
It was discovered that a race condition existed in the USB YUREX device driver in the Linux kernel. (CVE-2019-15216)
It was discovered that the Siano USB MDTV receiver device driver in the Linux kernel made improper assumptions about the device characteristics. (CVE-2019-15218)
It was discovered that the Line 6 POD USB device driver in the Linux kernel did not properly validate data size information from the device. (CVE-2019-15221)
Muyu Yu discovered that the CAN implementation in the Linux kernel in some situations did not properly restrict the field size when processing outgoing frames. A local attacker with CAP_NET_ADMIN privileges could use this to execute arbitrary code. (CVE-2019-3701)
Vladis Dronov discovered that the debug interface for the Linux kernel's HID subsystem did not properly validate passed parameters in some situations. (CVE-2019-3819)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: linux-image-4.15.0-1047-aws 4.15.0-1047.49 linux-image-aws 4.15.0.1047.46
Ubuntu 16.04 LTS: linux-image-4.15.0-1047-aws 4.15.0-1047.49~16.04.1 linux-image-aws-hwe 4.15.0.1047.47
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4118-1 CVE-2018-13053, CVE-2018-13093, CVE-2018-13096, CVE-2018-13097, CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14609, CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613, CVE-2018-14614, CVE-2018-14615, CVE-2018-14616, CVE-2018-14617, CVE-2018-16862, CVE-2018-19985, CVE-2018-20169, CVE-2018-20511, CVE-2018-20784, CVE-2018-20856, CVE-2018-5383, CVE-2019-0136, CVE-2019-10126, CVE-2019-10207, CVE-2019-10638, CVE-2019-10639, CVE-2019-11085, CVE-2019-11487, CVE-2019-11599, CVE-2019-11810, CVE-2019-11815, CVE-2019-11833, CVE-2019-11884, CVE-2019-12818, CVE-2019-12819, CVE-2019-12984, CVE-2019-13233, CVE-2019-13272, CVE-2019-13631, CVE-2019-14283, CVE-2019-14284, CVE-2019-14763, CVE-2019-15090, CVE-2019-15211, CVE-2019-15212, CVE-2019-15214, CVE-2019-15215, CVE-2019-15216, CVE-2019-15218, CVE-2019-15220, CVE-2019-15221, CVE-2019-15292, CVE-2019-2024, CVE-2019-2101, CVE-2019-3701, CVE-2019-3819, CVE-2019-3846, CVE-2019-3900, CVE-2019-9506
Package Information: https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1047.49 https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1047.49~16.04.1 . Unfortunately, as part of the update, a regression was introduced that caused a kernel crash when handling fragmented packets in some situations. This update addresses the issue.
We apologize for the inconvenience
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0917", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dual band wireless-ac", "scope": "eq", "trust": 1.2, "vendor": "intel", "version": "7265" }, { "model": "dual band wireless-n", "scope": "eq", "trust": 1.2, "vendor": "intel", "version": "7265" }, { "model": "wireless-n", "scope": "eq", "trust": 1.2, "vendor": "intel", "version": "7265" }, { "model": "proset\\/wireless wifi", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "21.10" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "dual band wireless-ac 8260", "scope": "lte", "trust": 0.8, "vendor": "intel", "version": "windows10 driver version 20.50.1.1" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "3160" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "7260" }, { "model": "dual band wireless-ac for desktop", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "7260" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "3165" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "3168" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "8260" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "8265" }, { "model": "dual band wireless-ac desktop kit", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "8265" }, { "model": "dual band wireless-n", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "7260" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "18265" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "17265" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "18260" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "9560" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "9461" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "9462" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "9260" }, { "model": "wireless-n", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "7260" }, { "model": "wi-fi ax200", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "6" }, { "model": "wi-fi ax201", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "6" }, { "model": "wireless-n", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72600" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "95600" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "94620" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "94610" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "92600" }, { "model": "wi-fi ax201", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "60" }, { "model": "wi-fi ax200", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "60" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "182650" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "182600" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "172650" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "20.120.1" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "17.16" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "16.1.1" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "15.8" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "21.0" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "20.100" }, { "model": "dual band wireless-n", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72650" }, { "model": "dual band wireless-n", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72600" }, { "model": "dual band wireless-ac desktop kit", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "82650" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "82650" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "82600" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72650" }, { "model": "dual band wireless-ac for desktop", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72600" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72600" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "31680" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "31650" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "31600" }, { "model": "proset/wireless wifi software", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "21.10" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "BID", "id": "108777" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "NVD", "id": "CVE-2019-0136" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu,JPCERT", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-530" } ], "trust": 0.6 }, "cve": "CVE-2019-0136", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2019-0136", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Partial", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2019-000046", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2019-25748", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2019-0136", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "IPA", "availabilityImpact": "Low", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2019-000046", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0136", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2019-000046", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-25748", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201906-530", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "CNNVD", "id": "CNNVD-201906-530" }, { "db": "NVD", "id": "CVE-2019-0136" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Intel Dual Band Wireless-AC 8260 contains a denial-of-service (DoS) vulnerability (CWE-400). Yusuke Ogawa of Cisco Systems G.K. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker may be able to cause a denial-of-service (DoS). IntelPROSet/WirelessWiFiSoftwaredriver is a wireless network card driver from Intel Corporation of the United States. The vulnerability stems from a network system or product that does not properly restrict access to resources from unauthorized roles that an attacker could use to cause a denial of service. Intel PROSet/Wireless WiFi Software driver\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u65e0\u7ebf\u7f51\u5361\u9a71\u52a8\u7a0b\u5e8f. \nIntel PROSet/Wireless WiFi Software driver 21.10\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u6b63\u786e\u9650\u5236\u6765\u81ea\u672a\u6388\u6743\u89d2\u8272\u7684\u8d44\u6e90\u8bbf\u95ee\u3002\u4ee5\u4e0b\u4ea7\u54c1\u53ca\u7248\u672c\u53d7\u5230\u5f71\u54cd\uff1aIntel Dual Band Wireless-AC 3160\uff1bDual Band Wireless-AC 7260\uff1bDual Band Wireless-N 7260\uff1bWireless-N 7260\uff1bDual Band Wireless-AC 7260 for Desktop\uff1bDual Band Wireless-AC 7265 (Rev. C)\uff1bDual Band Wireless-N 7265 (Rev. C)\uff1bWireless-N 7265 (Rev. C)\uff1bDual Band Wireless-AC 3165\uff1bDual Band Wireless-AC 7265 (Rev. D)\uff1bDual Band Wireless-N 7265 (Rev. D)\uff1bWireless-N 7265 (Rev. D)\uff1bDual Band Wireless-AC 3168\uff1bTri-Band Wireless-AC 17265\uff1bDual Band Wireless-AC 8260\uff1bTri-Band Wireless-AC 18260\uff1bDual Band Wireless-AC 8265\uff1bDual Band Wireless-AC 8265 Desktop Kit\uff1bTri-Band Wireless-AC 18265\uff1bWireless-AC 9560\uff1bWireless-AC 9461\uff1bWireless-AC 9462\uff1bWireless-AC 9260\uff1bWi-Fi 6 AX200\uff1bWi-Fi 6 AX201. \nAn attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. \n(CVE-2019-11477)\n\nJonathan Looney discovered that the TCP retransmission queue implementation\nin the Linux kernel could be fragmented when handling certain TCP Selective\nAcknowledgment (SACK) sequences. (CVE-2019-14835)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your livepatches to the following\nversions:\n\n| Kernel | Version | flavors |\n|--------------------------+----------+--------------------------|\n| 4.4.0-148.174 | 58.1 | lowlatency, generic |\n| 4.4.0-148.174~14.04.1 | 58.1 | lowlatency, generic |\n| 4.4.0-150.176 | 58.1 | generic, lowlatency |\n| 4.4.0-150.176~14.04.1 | 58.1 | lowlatency, generic |\n| 4.4.0-151.178 | 58.1 | lowlatency, generic |\n| 4.4.0-151.178~14.04.1 | 58.1 | generic, lowlatency |\n| 4.4.0-154.181 | 58.1 | lowlatency, generic |\n| 4.4.0-154.181~14.04.1 | 58.1 | generic, lowlatency |\n| 4.4.0-157.185 | 58.1 | lowlatency, generic |\n| 4.4.0-157.185~14.04.1 | 58.1 | generic, lowlatency |\n| 4.4.0-159.187 | 58.1 | lowlatency, generic |\n| 4.4.0-159.187~14.04.1 | 58.1 | generic, lowlatency |\n| 4.4.0-161.189 | 58.1 | lowlatency, generic |\n| 4.4.0-161.189~14.04.1 | 58.1 | lowlatency, generic |\n| 4.4.0-164.192 | 58.1 | lowlatency, generic |\n| 4.4.0-164.192~14.04.1 | 58.1 | lowlatency, generic |\n| 4.4.0-165.193 | 58.1 | generic, lowlatency |\n| 4.4.0-1083.93 | 58.1 | aws |\n| 4.4.0-1084.94 | 58.1 | aws |\n| 4.4.0-1085.96 | 58.1 | aws |\n| 4.4.0-1087.98 | 58.1 | aws |\n| 4.4.0-1088.99 | 58.1 | aws |\n| 4.4.0-1090.101 | 58.1 | aws |\n| 4.4.0-1092.103 | 58.1 | aws |\n| 4.4.0-1094.105 | 58.1 | aws |\n| 4.15.0-50.54 | 58.1 | generic, lowlatency |\n| 4.15.0-50.54~16.04.1 | 58.1 | generic, lowlatency |\n| 4.15.0-51.55 | 58.1 | generic, lowlatency |\n| 4.15.0-51.55~16.04.1 | 58.1 | generic, lowlatency |\n| 4.15.0-52.56 | 58.1 | lowlatency, generic |\n| 4.15.0-52.56~16.04.1 | 58.1 | generic, lowlatency |\n| 4.15.0-54.58 | 58.1 | generic, lowlatency |\n| 4.15.0-54.58~16.04.1 | 58.1 | generic, lowlatency |\n| 4.15.0-55.60 | 58.1 | generic, lowlatency |\n| 4.15.0-58.64 | 58.1 | generic, lowlatency |\n| 4.15.0-58.64~16.04.1 | 58.1 | lowlatency, generic |\n| 4.15.0-60.67 | 58.1 | lowlatency, generic |\n| 4.15.0-60.67~16.04.1 | 58.1 | generic, lowlatency |\n| 4.15.0-62.69 | 58.1 | generic, lowlatency |\n| 4.15.0-62.69~16.04.1 | 58.1 | lowlatency, generic |\n| 4.15.0-64.73 | 58.1 | generic, lowlatency |\n| 4.15.0-64.73~16.04.1 | 58.1 | lowlatency, generic |\n| 4.15.0-65.74 | 58.1 | lowlatency, generic |\n| 4.15.0-1038.43 | 58.1 | oem |\n| 4.15.0-1039.41 | 58.1 | aws |\n| 4.15.0-1039.44 | 58.1 | oem |\n| 4.15.0-1040.42 | 58.1 | aws |\n| 4.15.0-1041.43 | 58.1 | aws |\n| 4.15.0-1043.45 | 58.1 | aws |\n| 4.15.0-1043.48 | 58.1 | oem |\n| 4.15.0-1044.46 | 58.1 | aws |\n| 4.15.0-1045.47 | 58.1 | aws |\n| 4.15.0-1045.50 | 58.1 | oem |\n| 4.15.0-1047.49 | 58.1 | aws |\n| 4.15.0-1047.51 | 58.1 | azure |\n| 4.15.0-1048.50 | 58.1 | aws |\n| 4.15.0-1049.54 | 58.1 | azure |\n| 4.15.0-1050.52 | 58.1 | aws |\n| 4.15.0-1050.55 | 58.1 | azure |\n| 4.15.0-1050.57 | 58.1 | oem |\n| 4.15.0-1051.53 | 58.1 | aws |\n| 4.15.0-1051.56 | 58.1 | azure |\n| 4.15.0-1052.57 | 58.1 | azure |\n| 4.15.0-1055.60 | 58.1 | azure |\n| 4.15.0-1056.61 | 58.1 | azure |\n| 4.15.0-1056.65 | 58.1 | oem |\n| 4.15.0-1057.62 | 58.1 | azure |\n| 4.15.0-1057.66 | 58.1 | oem |\n| 4.15.0-1059.64 | 58.1 | azure |\n| 5.0.0-1014.14~18.04.1 | 58.1 | azure |\n| 5.0.0-1016.17~18.04.1 | 58.1 | azure |\n| 5.0.0-1018.19~18.04.1 | 58.1 | azure |\n| 5.0.0-1020.21~18.04.1 | 58.1 | azure |\n\nSupport Information:\n\nKernels older than the levels listed below do not receive livepatch\nupdates. Please upgrade your kernel as soon as possible. \n\n| Series | Version | Flavors |\n|------------------+------------------+--------------------------|\n| Ubuntu 18.04 LTS | 4.15.0-1039 | aws |\n| Ubuntu 16.04 LTS | 4.4.0-1083 | aws |\n| Ubuntu 18.04 LTS | 5.0.0-1000 | azure |\n| Ubuntu 16.04 LTS | 4.15.0-1047 | azure |\n| Ubuntu 18.04 LTS | 4.15.0-50 | generic lowlatency |\n| Ubuntu 16.04 LTS | 4.15.0-50 | generic lowlatency |\n| Ubuntu 14.04 LTS | 4.4.0-148 | generic lowlatency |\n| Ubuntu 18.04 LTS | 4.15.0-1038 | oem |\n| Ubuntu 16.04 LTS | 4.4.0-148 | generic lowlatency |\n\nReferences:\n CVE-2016-10905, CVE-2018-20856, CVE-2018-20961, CVE-2018-20976, \n CVE-2018-21008, CVE-2019-0136, CVE-2019-2054, CVE-2019-2181, \n CVE-2019-3846, CVE-2019-10126, CVE-2019-10207, CVE-2019-11477, \n CVE-2019-11478, CVE-2019-11833, CVE-2019-12614, CVE-2019-14283, \n CVE-2019-14284, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, \n CVE-2019-14821, CVE-2019-14835\n\n\n-- \nubuntu-security-announce mailing list\[email protected]\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n. =========================================================================\nUbuntu Security Notice USN-4118-1\nSeptember 02, 2019\n\nlinux-aws vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux-aws: Linux kernel for Amazon Web Services (AWS) systems\n- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems\n\nDetails:\n\nIt was discovered that the alarmtimer implementation in the Linux kernel\ncontained an integer overflow vulnerability. (CVE-2018-13053)\n\nWen Xu discovered that the XFS filesystem implementation in the Linux\nkernel did not properly track inode validations. (CVE-2018-13093)\n\nWen Xu discovered that the f2fs file system implementation in the Linux\nkernel did not properly validate metadata. (CVE-2018-13096, CVE-2018-13097, CVE-2018-13098,\nCVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14615,\nCVE-2018-14616)\n\nWen Xu and Po-Ning Tseng discovered that btrfs file system implementation\nin the Linux kernel did not properly validate metadata. (CVE-2018-14609, CVE-2018-14610,\nCVE-2018-14611, CVE-2018-14612, CVE-2018-14613)\n\nWen Xu discovered that the HFS+ filesystem implementation in the Linux\nkernel did not properly handle malformed catalog data in some situations. (CVE-2018-14617)\n\nVasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem\nof the Linux kernel did not properly initialize new files in some\nsituations. A local attacker could use this to expose sensitive\ninformation. (CVE-2018-16862)\n\nHui Peng and Mathias Payer discovered that the Option USB High Speed driver\nin the Linux kernel did not properly validate metadata received from the\ndevice. (CVE-2018-19985)\n\nHui Peng and Mathias Payer discovered that the USB subsystem in the Linux\nkernel did not properly handle size checks when handling an extra USB\ndescriptor. (CVE-2018-20169)\n\nZhipeng Xie discovered that an infinite loop could triggered in the CFS\nLinux kernel process scheduler. (CVE-2018-20784)\n\nIt was discovered that a use-after-free error existed in the block layer\nsubsystem of the Linux kernel when certain failure conditions occurred. (CVE-2018-20856)\n\nEli Biham and Lior Neumann discovered that the Bluetooth implementation in\nthe Linux kernel did not properly validate elliptic curve parameters during\nDiffie-Hellman key exchange in some situations. An attacker could use this\nto expose sensitive information. (CVE-2018-5383)\n\nIt was discovered that the Intel wifi device driver in the Linux kernel did\nnot properly validate certain Tunneled Direct Link Setup (TDLS). (CVE-2019-0136)\n\nIt was discovered that a heap buffer overflow existed in the Marvell\nWireless LAN device driver for the Linux kernel. (CVE-2019-10126)\n\nIt was discovered that the Bluetooth UART implementation in the Linux\nkernel did not properly check for missing tty operations. (CVE-2019-10207)\n\nAmit Klein and Benny Pinkas discovered that the Linux kernel did not\nsufficiently randomize IP ID values generated for connectionless networking\nprotocols. A remote attacker could use this to track particular Linux\ndevices. (CVE-2019-10638)\n\nAmit Klein and Benny Pinkas discovered that the location of kernel\naddresses could exposed by the implementation of connection-less network\nprotocols in the Linux kernel. A remote attacker could possibly use this to\nassist in the exploitation of another vulnerability in the Linux kernel. \n(CVE-2019-10639)\n\nAdam Zabrocki discovered that the Intel i915 kernel mode graphics driver in\nthe Linux kernel did not properly restrict mmap() ranges in some\nsituations. (CVE-2019-11085)\n\nIt was discovered that an integer overflow existed in the Linux kernel when\nreference counting pages, leading to potential use-after-free issues. (CVE-2019-11487)\n\nJann Horn discovered that a race condition existed in the Linux kernel when\nperforming core dumps. (CVE-2019-11599)\n\nIt was discovered that a null pointer dereference vulnerability existed in\nthe LSI Logic MegaRAID driver in the Linux kernel. (CVE-2019-11810)\n\nIt was discovered that a race condition leading to a use-after-free existed\nin the Reliable Datagram Sockets (RDS) protocol implementation in the Linux\nkernel. The RDS protocol is blacklisted by default in Ubuntu. (CVE-2019-11815)\n\nIt was discovered that the ext4 file system implementation in the Linux\nkernel did not properly zero out memory in some situations. A local\nattacker could use this to expose sensitive information (kernel memory). \n(CVE-2019-11833)\n\nIt was discovered that the Bluetooth Human Interface Device Protocol (HIDP)\nimplementation in the Linux kernel did not properly verify strings were\nNULL terminated in certain situations. A local attacker could use this to\nexpose sensitive information (kernel memory). (CVE-2019-11884)\n\nIt was discovered that a NULL pointer dereference vulnerabilty existed in\nthe Near-field communication (NFC) implementation in the Linux kernel. \n(CVE-2019-12818)\n\nIt was discovered that the MDIO bus devices subsystem in the Linux kernel\nimproperly dropped a device reference in an error condition, leading to a\nuse-after-free. (CVE-2019-12819)\n\nIt was discovered that a NULL pointer dereference vulnerability existed in\nthe Near-field communication (NFC) implementation in the Linux kernel. \n(CVE-2019-12984)\n\nJann Horn discovered a use-after-free vulnerability in the Linux kernel\nwhen accessing LDT entries in some situations. (CVE-2019-13233)\n\nJann Horn discovered that the ptrace implementation in the Linux kernel did\nnot properly record credentials in some situations. (CVE-2019-13272)\n\nIt was discovered that the GTCO tablet input driver in the Linux kernel did\nnot properly bounds check the initial HID report sent by the device. (CVE-2019-13631)\n\nIt was discovered that the floppy driver in the Linux kernel did not\nproperly validate meta data, leading to a buffer overread. \n(CVE-2019-14283)\n\nIt was discovered that the floppy driver in the Linux kernel did not\nproperly validate ioctl() calls, leading to a division-by-zero. \n(CVE-2019-14284)\n\nTuba Yavuz discovered that a race condition existed in the DesignWare USB3\nDRD Controller device driver in the Linux kernel. (CVE-2019-14763)\n\nIt was discovered that an out-of-bounds read existed in the QLogic QEDI\niSCSI Initiator Driver in the Linux kernel. A local attacker could possibly\nuse this to expose sensitive information (kernel memory). (CVE-2019-15090)\n\nIt was discovered that the Raremono AM/FM/SW radio device driver in the\nLinux kernel did not properly allocate memory, leading to a use-after-free. (CVE-2019-15211)\n\nIt was discovered at a double-free error existed in the USB Rio 500 device\ndriver for the Linux kernel. (CVE-2019-15212)\n\nIt was discovered that a race condition existed in the Advanced Linux Sound\nArchitecture (ALSA) subsystem of the Linux kernel, leading to a potential\nuse-after-free. \n(CVE-2019-15214)\n\nIt was discovered that a race condition existed in the CPiA2 video4linux\ndevice driver for the Linux kernel, leading to a use-after-free. (CVE-2019-15215)\n\nIt was discovered that a race condition existed in the Softmac USB Prism54\ndevice driver in the Linux kernel. (CVE-2019-15220)\n\nIt was discovered that a use-after-free vulnerability existed in the\nAppletalk implementation in the Linux kernel if an error occurs during\ninitialization. (CVE-2019-15292)\n\nIt was discovered that the Empia EM28xx DVB USB device driver\nimplementation in the Linux kernel contained a use-after-free vulnerability\nwhen disconnecting the device. (CVE-2019-2024)\n\nIt was discovered that the USB video device class implementation in the\nLinux kernel did not properly validate control bits, resulting in an out of\nbounds buffer read. A local attacker could use this to possibly expose\nsensitive information (kernel memory). (CVE-2019-2101)\n\nIt was discovered that the Marvell Wireless LAN device driver in the Linux\nkernel did not properly validate the BSS descriptor. (CVE-2019-3846)\n\nJason Wang discovered that an infinite loop vulnerability existed in the\nvirtio net driver in the Linux kernel. \n(CVE-2019-3900)\n\nDaniele Antonioli, Nils Ole Tippenhauer, and Kasper B. Rasmussen discovered\nthat the Bluetooth protocol BR/EDR specification did not properly require\nsufficiently strong encryption key lengths. A physicall proximate attacker\ncould use this to expose sensitive information. (CVE-2019-9506)\n\nIt was discovered that the Appletalk IP encapsulation driver in the Linux\nkernel did not properly prevent kernel addresses from being copied to user\nspace. A local attacker with the CAP_NET_ADMIN capability could use this to\nexpose sensitive information. (CVE-2018-20511)\n\nIt was discovered that a race condition existed in the USB YUREX device\ndriver in the Linux kernel. (CVE-2019-15216)\n\nIt was discovered that the Siano USB MDTV receiver device driver in the\nLinux kernel made improper assumptions about the device characteristics. (CVE-2019-15218)\n\nIt was discovered that the Line 6 POD USB device driver in the Linux kernel\ndid not properly validate data size information from the device. (CVE-2019-15221)\n\nMuyu Yu discovered that the CAN implementation in the Linux kernel in some\nsituations did not properly restrict the field size when processing\noutgoing frames. A local attacker with CAP_NET_ADMIN privileges could use\nthis to execute arbitrary code. (CVE-2019-3701)\n\nVladis Dronov discovered that the debug interface for the Linux kernel\u0027s\nHID subsystem did not properly validate passed parameters in some\nsituations. (CVE-2019-3819)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS:\n linux-image-4.15.0-1047-aws 4.15.0-1047.49\n linux-image-aws 4.15.0.1047.46\n\nUbuntu 16.04 LTS:\n linux-image-4.15.0-1047-aws 4.15.0-1047.49~16.04.1\n linux-image-aws-hwe 4.15.0.1047.47\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://usn.ubuntu.com/4118-1\n CVE-2018-13053, CVE-2018-13093, CVE-2018-13096, CVE-2018-13097,\n CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14609,\n CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613,\n CVE-2018-14614, CVE-2018-14615, CVE-2018-14616, CVE-2018-14617,\n CVE-2018-16862, CVE-2018-19985, CVE-2018-20169, CVE-2018-20511,\n CVE-2018-20784, CVE-2018-20856, CVE-2018-5383, CVE-2019-0136,\n CVE-2019-10126, CVE-2019-10207, CVE-2019-10638, CVE-2019-10639,\n CVE-2019-11085, CVE-2019-11487, CVE-2019-11599, CVE-2019-11810,\n CVE-2019-11815, CVE-2019-11833, CVE-2019-11884, CVE-2019-12818,\n CVE-2019-12819, CVE-2019-12984, CVE-2019-13233, CVE-2019-13272,\n CVE-2019-13631, CVE-2019-14283, CVE-2019-14284, CVE-2019-14763,\n CVE-2019-15090, CVE-2019-15211, CVE-2019-15212, CVE-2019-15214,\n CVE-2019-15215, CVE-2019-15216, CVE-2019-15218, CVE-2019-15220,\n CVE-2019-15221, CVE-2019-15292, CVE-2019-2024, CVE-2019-2101,\n CVE-2019-3701, CVE-2019-3819, CVE-2019-3846, CVE-2019-3900,\n CVE-2019-9506\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1047.49\n https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1047.49~16.04.1\n. Unfortunately, as part of the update,\na regression was introduced that caused a kernel crash when handling\nfragmented packets in some situations. This update addresses the issue. \n\nWe apologize for the inconvenience", "sources": [ { "db": "NVD", "id": "CVE-2019-0136" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "CNNVD", "id": "CNNVD-201906-530" }, { "db": "BID", "id": "108777" }, { "db": "PACKETSTORM", "id": "154951" }, { "db": "PACKETSTORM", "id": "154315" }, { "db": "PACKETSTORM", "id": "154695" }, { "db": "PACKETSTORM", "id": "154326" }, { "db": "PACKETSTORM", "id": "154740" }, { "db": "PACKETSTORM", "id": "154446" } ], "trust": 3.51 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0136", "trust": 4.7 }, { "db": "BID", "id": "108777", "trust": 2.5 }, { "db": "JVN", "id": "JVN75617741", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2019-000046", "trust": 2.0 }, { "db": "PACKETSTORM", "id": "154951", "trust": 1.7 }, { "db": "LENOVO", "id": "LEN-27828", "trust": 1.6 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "154326", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25748", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-27701", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0766", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0615", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3334", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201906-530", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "154315", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154695", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154740", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154446", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "BID", "id": "108777" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "PACKETSTORM", "id": "154951" }, { "db": "PACKETSTORM", "id": "154315" }, { "db": "PACKETSTORM", "id": "154695" }, { "db": "PACKETSTORM", "id": "154326" }, { "db": "PACKETSTORM", "id": "154740" }, { "db": "PACKETSTORM", "id": "154446" }, { "db": "CNNVD", "id": "CNNVD-201906-530" }, { "db": "NVD", "id": "CVE-2019-0136" } ] }, "id": "VAR-201906-0917", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" } ], "trust": 1.1247928816666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" } ] }, "last_update_date": "2024-11-29T21:43:48.618000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 1.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Downloads for Intel Dual Band Wireless-AC 8260", "trust": 0.8, "url": "https://downloadcenter.intel.com/en/product/86068" }, { "title": "IntelPROSet/WirelessWiFiSoftwaredriver Access Control Error Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/173035" }, { "title": "Intel PROSet/Wireless WiFi Software driver Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93761" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "CNNVD", "id": "CNNVD-201906-530" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "NVD", "id": "CVE-2019-0136" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.securityfocus.com/bid/108777" }, { "trust": 2.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 2.4, "url": "http://jvn.jp/en/jp/jvn75617741/index.html" }, { "trust": 2.2, "url": "https://usn.ubuntu.com/4115-1/" }, { "trust": 2.2, "url": "https://usn.ubuntu.com/4147-1/" }, { "trust": 1.9, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "trust": 1.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 1.6, "url": "https://support.lenovo.com/us/en/product_security/len-27828" }, { "trust": 1.6, "url": "http://packetstormsecurity.com/files/154951/kernel-live-patch-security-notice-lsn-0058-1.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html" }, { "trust": 1.6, "url": "https://usn.ubuntu.com/4145-1/" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html" }, { "trust": 1.6, "url": "https://usn.ubuntu.com/4118-1/" }, { "trust": 1.2, "url": "https://jvndb.jvn.jp/en/contents/2019/jvndb-2019-000046.html" }, { "trust": 1.2, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10207" }, { "trust": 0.6, "url": "https://usn.ubuntu.com/4116-1/" }, { "trust": 0.6, "url": "https://usn.ubuntu.com/4114-1/" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/zh/product_security/len-27828" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-27701" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3334/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0766/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0615" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/154326/ubuntu-security-notice-usn-4118-1.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13631" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11487" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15211" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15215" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14284" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14283" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15221" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11599" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15090" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20784" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15220" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19985" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10639" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10638" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15218" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15212" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20856" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10905" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10126" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20976" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20961" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11810" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3819" }, { "trust": 0.2, "url": "https://usn.ubuntu.com/4115-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13648" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15292" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3701" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3900" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15216" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14763" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15214" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15926" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14815" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11478" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2181" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14821" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14835" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11477" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3846" }, { "trust": 0.1, "url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14816" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12614" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21008" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11833" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2054" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14814" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1022.25~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1022.25" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-60.67~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1043.43" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1041.43" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-60.67" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1056.61" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1041.43" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1044.47" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1095.106" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1123.132" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18509" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1059.66" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-165.193" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4145-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1127.135" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16862" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14610" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4118-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14616" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13098" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13093" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20169" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14614" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11085" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14611" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13053" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1047.49" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14612" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13099" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20511" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13100" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14617" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1047.49~16.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5383" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15223" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.0.0-31.33" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15538" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4147-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15118" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15217" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15925" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/5.0.0-1023.24" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/5.0.0-31.33~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1020.20" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15117" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1019.19" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9506" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1018.20" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1022.23" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1020.20~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1019.20" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-62.69" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1023.26" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1842447" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1044.44" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1042.44" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1057.62" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1045.49" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1023.26~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1042.44" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4115-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-62.69~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1048.50" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1048.50~16.04.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "BID", "id": "108777" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "PACKETSTORM", "id": "154951" }, { "db": "PACKETSTORM", "id": "154315" }, { "db": "PACKETSTORM", "id": "154695" }, { "db": "PACKETSTORM", "id": "154326" }, { "db": "PACKETSTORM", "id": "154740" }, { "db": "PACKETSTORM", "id": "154446" }, { "db": "CNNVD", "id": "CNNVD-201906-530" }, { "db": "NVD", "id": "CVE-2019-0136" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "BID", "id": "108777" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "PACKETSTORM", "id": "154951" }, { "db": "PACKETSTORM", "id": "154315" }, { "db": "PACKETSTORM", "id": "154695" }, { "db": "PACKETSTORM", "id": "154326" }, { "db": "PACKETSTORM", "id": "154740" }, { "db": "PACKETSTORM", "id": "154446" }, { "db": "CNNVD", "id": "CNNVD-201906-530" }, { "db": "NVD", "id": "CVE-2019-0136" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-04T00:00:00", "db": "CNVD", "id": "CNVD-2019-25748" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108777" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "date": "2019-10-23T18:32:10", "db": "PACKETSTORM", "id": "154951" }, { "date": "2019-09-02T23:48:23", "db": "PACKETSTORM", "id": "154315" }, { "date": "2019-10-01T20:45:14", "db": "PACKETSTORM", "id": "154695" }, { "date": "2019-09-03T16:47:23", "db": "PACKETSTORM", "id": "154326" }, { "date": "2019-10-05T14:13:57", "db": "PACKETSTORM", "id": "154740" }, { "date": "2019-09-11T13:57:38", "db": "PACKETSTORM", "id": "154446" }, { "date": "2019-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-530" }, { "date": "2019-06-13T16:29:00.763000", "db": "NVD", "id": "CVE-2019-0136" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-04T00:00:00", "db": "CNVD", "id": "CNVD-2019-25748" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108777" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-530" }, { "date": "2024-11-21T04:16:18.603000", "db": "NVD", "id": "CVE-2019-0136" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-530" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel PROSet/Wireless WiFi Software driver Access Control Error Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "CNNVD", "id": "CNNVD-201906-530" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-530" } ], "trust": 0.6 } }
var-201807-2218
Vulnerability from variot
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis. Intel Systems with microprocessors contain information disclosure vulnerabilities.Information may be obtained. Multiple CPU Hardware are prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. ARM CPU is a CPU (central processing unit) product of the British ARM company. Intel CPU is a CPU (central processing unit) product of Intel Corporation of the United States. This vulnerability stems from configuration errors in network systems or products during operation. 7) - aarch64, noarch, ppc64le
Bug Fix(es):
-
Kernel panic on job cleanup, related to SyS_getdents64 (BZ#1702057)
-
Kernel modules generated incorrectly when system is localized to non-English language (BZ#1705285)
-
RHEL-Alt-7.6 - Fixup tlbie vs store ordering issue on POWER9 (BZ#1756270)
-
1713059 - CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c 1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c 1744130 - CVE-2019-14814 kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS 1744137 - CVE-2019-14815 kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS 1744149 - CVE-2019-14816 kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver 1771909 - CVE-2019-17133 kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c 1777825 - CVE-2019-18660 kernel: (powerpc) incomplete Spectre-RSB mitigation leads to information exposure
-
7) - noarch, x86_64
-
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. (BZ#1594915)
Bug Fix(es):
-
ovl_create can return positive retval and crash the host (BZ#1696290)
-
THP: Race between MADV_DONTNEED and NUMA hinting node migration code (BZ#1698105)
-
RHEL7.6 - Kernel changes for count cache flush Spectre v2 mitigation (BZ#1708543)
-
Poor system performance from thundering herd of kworkers competing for mddev->flush_bio ownership (BZ#1712762)
-
[RHEL7.7] RAID1
write-behind
causes a kernel panic (BZ#1712999)
Enhancement(s):
-
[Intel 7.5 FEAT] i40evf - Update to latest upstream driver version (BZ#1722774)
-
[netdrv] i40e/i40evf: Fix use after free in Rx cleanup path [7.4.z] (BZ#1723831)
Users of kernel are advised to upgrade to these updated packages, which fix these bugs and add these enhancements. 6) - i386, x86_64
Bug Fix(es):
-
The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the page vectors were cleared only if they were full. Subsequently, the amount of memory held in page vectors, which is not reclaimable, was sometimes too high. Consequently the page reclamation started the Out of Memory (OOM) killing processes. With this update, the underlying source code has been fixed to clear LRU page vectors each time when a compound page is added to them. As a result, OOM killing processes due to high amounts of memory held in page vectors no longer occur. (BZ#1575819)
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2384-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2384 Issue date: 2018-08-14 CVE Names: CVE-2017-13215 CVE-2018-3620 CVE-2018-3646 CVE-2018-3693 CVE-2018-5390 CVE-2018-7566 CVE-2018-10675 ==================================================================== 1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch, ppc64le
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
-
Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
-
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
-
A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
-
kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)
-
kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
-
kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:
https://access.redhat.com/articles/3527791
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1535173 - CVE-2017-13215 kernel: crypto: privilege escalation in skcipher_recvmsg function 1550142 - CVE-2018-7566 kernel: race condition in snd_seq_write() may lead to UAF or OOB-access 1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact 1581650 - CVE-2018-3693 Kernel: speculative bounds check bypass store 1585005 - CVE-2018-3646 Kernel: hw: cpu: L1 terminal fault (L1TF) 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: kernel-3.10.0-862.11.6.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: kernel-3.10.0-862.11.6.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: kernel-3.10.0-862.11.6.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
ppc64: kernel-3.10.0-862.11.6.el7.ppc64.rpm kernel-bootwrapper-3.10.0-862.11.6.el7.ppc64.rpm kernel-debug-3.10.0-862.11.6.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm kernel-devel-3.10.0-862.11.6.el7.ppc64.rpm kernel-headers-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.ppc64.rpm perf-3.10.0-862.11.6.el7.ppc64.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm python-perf-3.10.0-862.11.6.el7.ppc64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm
ppc64le: kernel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm perf-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm
s390x: kernel-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm kernel-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-headers-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm perf-3.10.0-862.11.6.el7.s390x.rpm perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm python-perf-3.10.0-862.11.6.el7.s390x.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm
x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
ppc64le: kernel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm perf-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm
s390x: kernel-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm kernel-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-headers-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm perf-3.10.0-862.11.6.el7.s390x.rpm perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm python-perf-3.10.0-862.11.6.el7.s390x.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm
ppc64le: kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm
x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
noarch: kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
ppc64le: kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: kernel-3.10.0-862.11.6.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm
x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2017-13215 https://access.redhat.com/security/cve/CVE-2018-3620 https://access.redhat.com/security/cve/CVE-2018-3646 https://access.redhat.com/security/cve/CVE-2018-3693 https://access.redhat.com/security/cve/CVE-2018-5390 https://access.redhat.com/security/cve/CVE-2018-7566 https://access.redhat.com/security/cve/CVE-2018-10675 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/L1TF https://access.redhat.com/articles/3527791
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBW3MjONzjgjWX9erEAQioYA/9Ge//K50oCrGaDEMuI2PHYLcztiZt9meh C578LP6sC/HT17VAbV8C+Tvy9QBCU80t4mGU4GOPu8Q5HzZQv45n0NtdRTGCC+yb A1bFcf0vhXIALNsuDEZN9g5SwUBapxkRoh43R+E7ITCQWp0XIPaSjYgGNqpTTuD/ lxRCzc10HhxW+pUY+ERFcK6c0poc14FtSqM3GqZe10FhkykdIlmngFjkthjzefXO dUkYDy53G+iAdTrVFI03h3Wt+UBMmNwKtu8ydqtAxZ0zDZIP5ijASOtM4mlf77ec VsNn7OWythkpTcpa+Sh5+dk6DK+lU2vziVsEocYNpzB+T/aHC9n/+I8ibfp3B4DC k4lYqZJQDFR2jVABjkOVS9dWFlOYKFmU2JBwsqdRvt3rgVFXEH3n5OQydHGFskmP NFwDbRAFlwo3zjd9KuiQzdFTOensc35+eSHykY8nxY2hGMH5gGccShFL4C7N2mtx s8JnzA/Zj00VHMg8qIHGfQ7RSd/xyEJ5vn87WZcTshTNli6x1/0VnzpTKG85Ga+K S2EJDXFP9LqCT98TL1RDJmCTtfDjU3I/gbgu5xFaofQZfV48qAUomUQ2E+MhQAOX eBr/OvlfFP8HEwVEJBDtXKxxs1LgmjTSqOtfP8AvS5zI9/Y6o56i0d7Ng1CcaGKP lZgWJhC3Yik=i4St -----END PGP SIGNATURE-----
-- RHSA-announce mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-2218", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "core i7", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "970" }, { "model": "core i7", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "960" }, { "model": "celeron n", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "n3000" }, { "model": "celeron n", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "n4100" }, { "model": "core i3", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "4360t" }, { "model": "atom x3", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3445" }, { "model": "core i3", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "330e" }, { "model": "core i7", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "965" }, { "model": "xeon e5 2650l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "720qm" }, { "model": "xeon e3 1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7235" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6585r" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3710" }, { "model": "xeon e5 2430l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210m" }, { "model": "xeon e3 1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10c" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5550" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6154" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v3" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "740qm" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6510" }, { "model": "xeon e3 1225 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3235rk" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4720hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4000m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2405s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2435m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3380m" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1545m_v5" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360" }, { "model": "xeon e5 2637", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2518" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3317u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700ec" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "460m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4807" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "15" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3480" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3580" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y32" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5677" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330m" }, { "model": "xeon e3 1278l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x6550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5750hq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570r" }, { "model": "xeon e3 1265l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2760qm" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134m" }, { "model": "xeon e5 2430 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "650" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3295rk" }, { "model": "xeon e3 1280 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4109t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5550u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3690" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v2" }, { "model": "xeon e5 2603 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "57" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6260u" }, { "model": "xeon e5 2620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1281 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660" }, { "model": "xeon e5 2450l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735d" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2340ue" }, { "model": "xeon e5 2630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867l" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5618" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y30" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775c" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8180" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460" }, { "model": "xeon e3 1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2650l_v4" }, { "model": "xeon e5 2420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675c" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v2" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "xeon e5 2648l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5557u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v3" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3455" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2629m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3700" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138f" }, { "model": "xeon e5 2438l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5257u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5502" }, { "model": "xeon bronze 3106", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2480" }, { "model": "xeon e5 2470 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600t" }, { "model": "xeon e5 2407 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2450 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2675qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2940" }, { "model": "xeon e5 2609 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "76" }, { "model": "cortex-r", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "7" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350k" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1850" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2358" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460t" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7285" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460s" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2900" }, { "model": "xeon e5 2609 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2550" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3808" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3350" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5200u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4260u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5506" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126f" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4750hq" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1515m_v5" }, { "model": "xeon e3 1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qm" }, { "model": "xeon e5 2418l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4722hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5500u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8650u" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3205rk" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v5" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2540m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5650" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3720qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210" }, { "model": "core m7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y75" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3785" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820eq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3827" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2102" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610me" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1800" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330e" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3010" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "470um" }, { "model": "xeon e5 1428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v3" }, { "model": "xeon e5 2430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4890_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5649" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "610e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370t" }, { "model": "xeon e5 2428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2640 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667" }, { "model": "communications eagle application processor", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "16.1.0" }, { "model": "xeon e5 2618l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2300" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "530" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660lm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5690" }, { "model": "xeon e5 2643 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2390t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4105" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2515e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3530" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4880_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176f" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1565l_v5" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4648_v3" }, { "model": "cortex-r", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "8" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600u" }, { "model": "xeon e5 1660 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2467m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850hq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5680" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8857_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8837" }, { "model": "xeon e5 2620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4800mq" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2830" }, { "model": "xeon e3 1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3406" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4628l_v4" }, { "model": "xeon e5 2618l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3480" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2665" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v2" }, { "model": "xeon e3 1220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500t" }, { "model": "xeon e5 2630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2550k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3689y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700hq" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3538" }, { "model": "xeon e3 1265l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5672" }, { "model": "xeon e5 1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hk" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v2" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3570" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3350p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3440" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3560" }, { "model": "xeon e5 1680 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3437u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300y" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3460" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3355" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6157u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5667" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160f" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4624l_v2" }, { "model": "xeon e5 1650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140m" }, { "model": "xeon e3 1268l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v4" }, { "model": "struxureware data center expert", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "7.6.0" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4550u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2520" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200u" }, { "model": "xeon e5 2608l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2803" }, { "model": "xeon e5 2643 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5518" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980x" }, { "model": "xeon e5 1620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2538" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3308" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y51" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4250u" }, { "model": "xeon e5 2637 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770r" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3955" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2357m" }, { "model": "xeon e3 1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hq" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2460" }, { "model": "xeon e3 1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8158" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6006u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4158u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217ue" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2750" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585l_v5" }, { "model": "xeon e5 2408l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3758" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3360m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7530" }, { "model": "xeon e5 1650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2348m" }, { "model": "xeon e3 1275 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v2" }, { "model": "xeon e3 1240 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v2" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3229y" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3845" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2308" }, { "model": "xeon e3 1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702ec" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650" }, { "model": "xeon e5 2637 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620ue" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5503" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6200u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4510u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5640" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200m" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y71" }, { "model": "xeon e5 2630l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5122" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2370m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3427u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5575r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4558u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710mq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8168" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2630qm" }, { "model": "xeon e3 1241 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4422e" }, { "model": "xeon e3 1230l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2312m" }, { "model": "xeon e3 1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7555" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700" }, { "model": "xeon e3 1271 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3635qm" }, { "model": "xeon e3 1260l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6167u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330te" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134" }, { "model": "xeon e3 1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7567u" }, { "model": "xeon e5 1650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2760" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3115c" }, { "model": "xeon e3 1245 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5670" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2738" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940xm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3430" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660ue" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "975" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5675" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450m" }, { "model": "xeon e3 1240 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658" }, { "model": "xeon e5 2623 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qm" }, { "model": "xeon e3 1285 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4000" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3470" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4760hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "990x" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200h" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8600k" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6146" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4960hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v3" }, { "model": "xeon e5 2628l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v3" }, { "model": "xeon e5 2630 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3590" }, { "model": "xeon e5 1428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v3" }, { "model": "xeon e5 2448l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5549" }, { "model": "xeon e5 2428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745d" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7545" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850eq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5508" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2350" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2560" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2758" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120me" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7560u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5509" }, { "model": "xeon e5 2637 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y75" }, { "model": "xeon e3 1285l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3958" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6102e" }, { "model": "communications eagle application processor", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "16.2.0" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4302y" }, { "model": "xeon e5 2418l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3805" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3825" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770d" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3337u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3508" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8153" }, { "model": "xeon e5 2603 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5118" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2910" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3405" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2657m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5250u" }, { "model": "xeon e3 1286l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1660 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5115" }, { "model": "xeon e3 12201 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590t" }, { "model": "xeon e5 2640 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500k" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "880" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3820qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2520m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650u" }, { "model": "xeon e3 1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5640" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4005" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3826" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2367m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3740qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2808" }, { "model": "xeon e3 1225 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5647" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4980hq" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3710" }, { "model": "xeon e3 1240l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "73" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2715qe" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4020y" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3460" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2130" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3670" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "17" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v2" }, { "model": "xeon e5 2430l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2718" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2610ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "390m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v3" }, { "model": "xeon e5 2448l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4025u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6360u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7920hq" }, { "model": "xeon e5 2407", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870hq" }, { "model": "xeon e3 1275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v3" }, { "model": "xeon e3 1270 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "930" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2655le" }, { "model": "xeon e3 1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2807" }, { "model": "xeon e3 1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y31" }, { "model": "xeon e5 2618l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v2" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "9" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8550u" }, { "model": "xeon e3 1220 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5506" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920xm" }, { "model": "xeon e3 1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3630qm" }, { "model": "xeon e5 2450l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670k" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2840" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7542" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620m" }, { "model": "xeon e3 1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2410m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400t" }, { "model": "xeon e5 1620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3130" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3339y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2620m" }, { "model": "xeon e3 1276 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1558l_v5" }, { "model": "xeon e3 1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4108" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2516" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2960xm" }, { "model": "xeon e5 2650l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "840qm" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699r_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4400e" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6152" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3815" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v4" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2920" }, { "model": "xeon e5 1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6685r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770s" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2815" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610" }, { "model": "m12-2", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp3090" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230f" }, { "model": "xeon e3 1220l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "8" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3225" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "875k" }, { "model": "xeon e3 1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350h" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1578l_v5" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3840qm" }, { "model": "xeon e3 1226 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v6" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4308u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2920xm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3338" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712mq" }, { "model": "xeon e5 1428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3230m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2720qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3227u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740d" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2930" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5539" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5157u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8164" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658a_v3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690" }, { "model": "xeon e5 2648l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2380p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5528" }, { "model": "xeon e3 1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700mq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5606" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4005u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640lm" }, { "model": "xeon e5 2628l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y57" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "820qm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3450" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600k" }, { "model": "xeon e3 1285 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2730" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3426" }, { "model": "xeon e3 12201", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v4" }, { "model": "xeon e5 2418l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3475s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340te" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2637m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3750" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120m" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1750" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "580m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5540" }, { "model": "xeon e5 1630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6136" }, { "model": "xeon e5 2450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699a_v4" }, { "model": "xeon e5 2403", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4785t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2375m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860hq" }, { "model": "xeon e3 1270 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3200rk" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770te" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585_v5" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "670" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6128" }, { "model": "xeon e5 2403 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440eq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2700k" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3230rk" }, { "model": "xeon e3 1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7540" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v2" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2649m" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4205" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2580" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6402p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8830" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7295" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5660" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660um" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2617m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697a_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870" }, { "model": "xeon e3 1245 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3667u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v3" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2806" }, { "model": "xeon e5 1630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775r" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736f" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2557m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4578u" }, { "model": "xeon e5 2470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "m12-2s", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp3090" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6144" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3050" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2316" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "350m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030u" }, { "model": "xeon e5 2648l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5645" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5590" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4910mq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6287u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100u" }, { "model": "xeon e3 1220 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-1105c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v3" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "75" }, { "model": "xeon e3 1258l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4202y" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100h" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2320" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8250u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3858" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2508" }, { "model": "xeon e3 1235", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650l" }, { "model": "xeon e3 1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3520m" }, { "model": "xeon e5 2640 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7660u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4410e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5638" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1575m_v5" }, { "model": "xeon e3 1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750" }, { "model": "xeon e5 2609 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "12" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860" }, { "model": "communications lsms", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "13.3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "370m" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2810" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1900" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540m" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2430m" }, { "model": "xeon e5 1620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210f" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6132" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5630" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2890_v2" }, { "model": "xeon e5 1660 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4200" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v4" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5607" }, { "model": "xeon e3 1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4012y" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y70" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4771" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520e" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3520" }, { "model": "xeon e5 2420 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6540" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5518" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5650u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620um" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5620" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "480m" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775d" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620lm" }, { "model": "xeon e3 1246 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1265l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4278u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3130m" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230" }, { "model": "xeon e3 1275l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2640m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340" }, { "model": "communications lsms", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "13.1" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5119t" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.5" }, { "model": "xeon e5 2623 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2125" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2805" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4657l_v2" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y30" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517ue" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5570" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5520" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3320m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3245" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2420" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2510e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3632qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710hq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6150" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3687u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5015u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6267u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300u" }, { "model": "xeon e3 1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1285l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v4" }, { "model": "xeon e3 1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4765t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3830" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670t" }, { "model": "xeon e5 1660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3680" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5287u" }, { "model": "xeon e5 2630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v3" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2635qm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670r" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300" }, { "model": "xeon e3 1230 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v4" }, { "model": "xeon e5 2440 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5603" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "655k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4102e" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1505m_v6" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qe" }, { "model": "m12-1", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp3090" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4810mq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8400" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5609" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210h" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3708" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6442eq" }, { "model": "xeon e3 1290 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2648l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1680 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3439y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2365m" }, { "model": "xeon e3 1231 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8156" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6098p" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5504" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4288u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4900mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5630" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2537m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3555le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350u" }, { "model": "xeon e3 1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5020u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "661" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2677m" }, { "model": "xeon e5 2628l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3510" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "72" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2338" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8894_v4" }, { "model": "xeon e3 1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4258u" }, { "model": "xeon e5 2609", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5507" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2820" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680" }, { "model": "xeon e5 2640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5010u" }, { "model": "solidfire element os management node", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4617" }, { "model": "xeon e3 1280 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2377m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2115c" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2710qe" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5580" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4120u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2350m" }, { "model": "xeon e3 1105c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4220y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500te" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7560" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6350hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430s" }, { "model": "xeon e3 1286 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3450" }, { "model": "xeon bronze 3104", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1290", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2880_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v3" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6320" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5005u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680um" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3795" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "450m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702hq" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10a" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5687" }, { "model": "xeon e3 1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v4" }, { "model": "xeon e5 2620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y54" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2328m" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380um" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2105" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3150" }, { "model": "xeon e5 2608l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440hq" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3265rk" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3537u" }, { "model": "atom c", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom z", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "1231_v3" }, { "model": "xeon e3", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "1220l_v2" }, { "model": "linux enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "12" }, { "model": "linux enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "virtualization host", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server update services for sap solutions", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.6" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.6" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.6" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.5" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.6" }, { "model": "enterprise linux server update services for sap solutions", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7." }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux for scientific computing", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for scientific computing", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux for real time", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power little endian extended update supp", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.6" }, { "model": "enterprise linux for power little endian extended update supp", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.5" }, { "model": "enterprise linux for power little endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.6" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.5" }, { "model": "enterprise linux for power big endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power big endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux for power", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "97" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.6" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.5" }, { "model": "enterprise linux for ibm z systems", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for ibm z systems", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux for ibm system z", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for arm", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "647" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.5" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "communications eagle application processor", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "16.2" }, { "model": "communications eagle application processor", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "16.1" }, { "model": "solidfire element os management node", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "xeon w processor", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xeon scalable processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v40" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v20" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v40" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v20" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v60" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v50" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v40" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v20" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xeon e processor", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "pentium silver processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "pentium processor n series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "pentium processor j series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "legacy xeon processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "core x-series processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "celeron processor n series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "celeron processor j series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "celeron processor g series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "celeron processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "30000" }, { "model": "celeron processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "20000" }, { "model": "celeron processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10000" }, { "model": "atom processor z series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "atom processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "x0" }, { "model": "atom processor s series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "atom processor n series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "atom processor e series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "atom processor d series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "atom processor c series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "9th generation core i9 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "9th generation core i7 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "9th generation core i5 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "8th generation core m processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "8th generation core i9 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "8th generation core i7 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "8th generation core i5 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "8th generation core i3 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "7th generation core m processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "7th generation core i7 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "7th generation core i5 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "7th generation core i3 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "6th generation core m processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "6th generation core i7 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "6th generation core i5 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "6th generation core i3 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "5th generation core m processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "5th generation core i7 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "5th generation core i5 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "5th generation core i3 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "4th generation core i7 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "4th generation core i5 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "4th generation core i3 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.4" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.3" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.2" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.1" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.4.1" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.3.2" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.3.1" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.2.1" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "qradar siem patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.16" }, { "model": "qradar siem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "cortex a57", "scope": "eq", "trust": 0.3, "vendor": "arm", "version": "0" }, { "model": "pro", "scope": "eq", "trust": 0.3, "vendor": "amd", "version": "0" } ], "sources": [ { "db": "BID", "id": "108004" }, { "db": "JVNDB", "id": "JVNDB-2018-005796" }, { "db": "CNNVD", "id": "CNNVD-201807-884" }, { "db": "NVD", "id": "CVE-2018-3693" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:intel:atom_c", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_x3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_z", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:celeron_j", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:celeron_n", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-005796" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "156020" }, { "db": "PACKETSTORM", "id": "148907" }, { "db": "PACKETSTORM", "id": "153815" }, { "db": "PACKETSTORM", "id": "148898" }, { "db": "PACKETSTORM", "id": "148899" }, { "db": "CNNVD", "id": "CNNVD-201807-884" } ], "trust": 1.1 }, "cve": "CVE-2018-3693", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2018-3693", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-133724", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2018-3693", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.6, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-3693", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2018-3693", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-3693", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201807-884", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-133724", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-3693", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-133724" }, { "db": "VULMON", "id": "CVE-2018-3693" }, { "db": "JVNDB", "id": "JVNDB-2018-005796" }, { "db": "CNNVD", "id": "CNNVD-201807-884" }, { "db": "NVD", "id": "CVE-2018-3693" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis. Intel Systems with microprocessors contain information disclosure vulnerabilities.Information may be obtained. Multiple CPU Hardware are prone to an information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in further attacks. ARM CPU is a CPU (central processing unit) product of the British ARM company. Intel CPU is a CPU (central processing unit) product of Intel Corporation of the United States. This vulnerability stems from configuration errors in network systems or products during operation. 7) - aarch64, noarch, ppc64le\n\n3. \n\nBug Fix(es):\n\n* Kernel panic on job cleanup, related to SyS_getdents64 (BZ#1702057)\n\n* Kernel modules generated incorrectly when system is localized to\nnon-English language (BZ#1705285)\n\n* RHEL-Alt-7.6 - Fixup tlbie vs store ordering issue on POWER9 (BZ#1756270)\n\n4. \n1713059 - CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c\n1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c\n1744130 - CVE-2019-14814 kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS\n1744137 - CVE-2019-14815 kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS\n1744149 - CVE-2019-14816 kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver\n1771909 - CVE-2019-17133 kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c\n1777825 - CVE-2019-18660 kernel: (powerpc) incomplete Spectre-RSB mitigation leads to information exposure\n\n6. 7) - noarch, x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n(BZ#1594915)\n\n4. \n\nBug Fix(es):\n\n* ovl_create can return positive retval and crash the host (BZ#1696290)\n\n* THP: Race between MADV_DONTNEED and NUMA hinting node migration code\n(BZ#1698105)\n\n* RHEL7.6 - Kernel changes for count cache flush Spectre v2 mitigation\n(BZ#1708543)\n\n* Poor system performance from thundering herd of kworkers competing for\nmddev-\u003eflush_bio ownership (BZ#1712762)\n\n* [RHEL7.7] RAID1 `write-behind` causes a kernel panic (BZ#1712999)\n\nEnhancement(s):\n\n* [Intel 7.5 FEAT] i40evf - Update to latest upstream driver version\n(BZ#1722774)\n\n* [netdrv] i40e/i40evf: Fix use after free in Rx cleanup path [7.4.z]\n(BZ#1723831)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix\nthese bugs and add these enhancements. 6) - i386, x86_64\n\n3. \n\nBug Fix(es):\n\n* The Least recently used (LRU) operations are batched by caching pages in\nper-cpu page vectors to prevent contention of the heavily used lru_lock\nspinlock. The page vectors can hold even the compound pages. Previously,\nthe page vectors were cleared only if they were full. Subsequently, the\namount of memory held in page vectors, which is not reclaimable, was\nsometimes too high. Consequently the page reclamation started the Out of\nMemory (OOM) killing processes. With this update, the underlying source\ncode has been fixed to clear LRU page vectors each time when a compound\npage is added to them. As a result, OOM killing processes due to high\namounts of memory held in page vectors no longer occur. (BZ#1575819)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel security and bug fix update\nAdvisory ID: RHSA-2018:2384-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:2384\nIssue date: 2018-08-14\nCVE Names: CVE-2017-13215 CVE-2018-3620 CVE-2018-3646\n CVE-2018-3693 CVE-2018-5390 CVE-2018-7566\n CVE-2018-10675\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch, ppc64le, s390x\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch, ppc64le\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to\nefficiently use available system resources and provide inter-domain\nprotection through access control and isolation. The L1TF issue was found\nin the way the x86 microprocessor designs have implemented speculative\nexecution of instructions (a commonly used performance optimisation) in\ncombination with handling of page-faults caused by terminated virtual to\nphysical address resolving process. As a result, an unprivileged attacker\ncould use this flaw to read privileged memory of the kernel or other\nprocesses and/or cross guest/host boundaries to read host memory by\nconducting targeted cache side-channel attacks. (CVE-2018-3620,\nCVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions past bounds\ncheck. The flaw relies on the presence of a precisely-defined instruction\nsequence in the privileged code and the fact that memory writes occur to an\naddress which depends on the untrusted value. Such writes cause an update\ninto the microprocessor\u0027s data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to influence speculative\nexecution and/or read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled\nspecially crafted TCP packets. A remote attacker could use this flaw to\ntrigger time and calculation expensive calls to tcp_collapse_ofo_queue()\nand tcp_prune_ofo_queue() functions by sending specially modified packets\nwithin ongoing TCP sessions which could lead to a CPU saturation and hence\na denial of service on the system. Maintaining the denial of service\ncondition requires continuous two-way TCP sessions to a reachable open\nport, thus the attacks cannot be performed using spoofed IP addresses. \n(CVE-2018-5390)\n\n* kernel: crypto: privilege escalation in skcipher_recvmsg function\n(CVE-2017-13215)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS\nor other unspecified impact (CVE-2018-10675)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB access\n(CVE-2018-7566)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting\nCVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl\nWaldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and\nJuha-Matti Tilli (Aalto University, Department of Communications and\nNetworking and Nokia Bell Labs) for reporting CVE-2018-5390. \n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space\nprecludes documenting all of the bug fixes in this advisory. See the\ndescriptions in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/3527791\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1535173 - CVE-2017-13215 kernel: crypto: privilege escalation in skcipher_recvmsg function\n1550142 - CVE-2018-7566 kernel: race condition in snd_seq_write() may lead to UAF or OOB-access\n1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact\n1581650 - CVE-2018-3693 Kernel: speculative bounds check bypass store\n1585005 - CVE-2018-3646 Kernel: hw: cpu: L1 terminal fault (L1TF)\n1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debug-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-devel-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-headers-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.ppc64.rpm\nperf-3.10.0-862.11.6.el7.ppc64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\npython-perf-3.10.0-862.11.6.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\n\nppc64le:\nkernel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm\nkernel-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-headers-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm\nperf-3.10.0-862.11.6.el7.s390x.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nppc64le:\nkernel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm\nkernel-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-headers-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm\nperf-3.10.0-862.11.6.el7.s390x.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):\n\nnoarch:\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-13215\nhttps://access.redhat.com/security/cve/CVE-2018-3620\nhttps://access.redhat.com/security/cve/CVE-2018-3646\nhttps://access.redhat.com/security/cve/CVE-2018-3693\nhttps://access.redhat.com/security/cve/CVE-2018-5390\nhttps://access.redhat.com/security/cve/CVE-2018-7566\nhttps://access.redhat.com/security/cve/CVE-2018-10675\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/L1TF\nhttps://access.redhat.com/articles/3527791\n\n8. Contact:\n\nThe Red Hat security contact is \[email protected]\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nlZgWJhC3Yik=i4St\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\[email protected]\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2018-3693" }, { "db": "JVNDB", "id": "JVNDB-2018-005796" }, { "db": "BID", "id": "108004" }, { "db": "VULHUB", "id": "VHN-133724" }, { "db": "VULMON", "id": "CVE-2018-3693" }, { "db": "PACKETSTORM", "id": "156020" }, { "db": "PACKETSTORM", "id": "148907" }, { "db": "PACKETSTORM", "id": "153815" }, { "db": "PACKETSTORM", "id": "148898" }, { "db": "PACKETSTORM", "id": "148899" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3693", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2018-005796", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-884", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156020", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "153815", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2861", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0226", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3234.2", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.0544", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1899", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1926", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.0726", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3234.3", "trust": 0.6 }, { "db": "BID", "id": "108004", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-133724", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-3693", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148907", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148898", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148899", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133724" }, { "db": "VULMON", "id": "CVE-2018-3693" }, { "db": "BID", "id": "108004" }, { "db": "JVNDB", "id": "JVNDB-2018-005796" }, { "db": "PACKETSTORM", "id": "156020" }, { "db": "PACKETSTORM", "id": "148907" }, { "db": "PACKETSTORM", "id": "153815" }, { "db": "PACKETSTORM", "id": "148898" }, { "db": "PACKETSTORM", "id": "148899" }, { "db": "CNNVD", "id": "CNNVD-201807-884" }, { "db": "NVD", "id": "CVE-2018-3693" } ] }, "id": "VAR-201807-2218", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-133724" } ], "trust": 0.8213039427272727 }, "last_update_date": "2024-11-23T20:59:25.282000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-OSS-10002", "trust": 0.8, "url": "https://01.org/security/advisories/intel-oss-10002" }, { "title": "Red Hat: Important: kernel security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191946 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182395 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182384 - Security Advisory" }, { "title": "Red Hat: CVE-2018-3693", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2018-3693" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182390 - Security Advisory" }, { "title": "Red Hat: Important: kernel-alt security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20200174 - Security Advisory" }, { "title": "Amazon Linux AMI: ALAS-2018-1038", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2018-1038" }, { "title": "Amazon Linux 2: ALAS2-2018-1038", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2018-1038" }, { "title": "IBM: IBM Security Bulletin: IBM Security Guardium is affected by Red Hat kernel vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=75b9d198a73a91d81765c8b428423224" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=204a1aa9ebf7b5f47151e8b011269862" }, { "title": "Fortinet Security Advisories: Meltdown and Spectre class vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-18-002" }, { "title": "IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=55ea315dfb69fce8383762ac64250315" }, { "title": "Spectre and Meltdown Guidance", "trust": 0.1, "url": "https://github.com/danswinus/HWFW " }, { "title": "Transient Execution Attack Pot", "trust": 0.1, "url": "https://github.com/github-3rr0r/TEApot " }, { "title": "Transient Execution Attack Pot", "trust": 0.1, "url": "https://github.com/Mashiro1995/TEApot " }, { "title": "Hardware attacks / State of the art", "trust": 0.1, "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/lnick2023/nicenice " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/qazbnm456/awesome-cve-poc " }, { "title": "Securelist", "trust": 0.1, "url": "https://securelist.com/kaspersky-security-bulletin-2018-top-security-stories/89118/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-3693" }, { "db": "JVNDB", "id": "JVNDB-2018-005796" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133724" }, { "db": "JVNDB", "id": "JVNDB-2018-005796" }, { "db": "NVD", "id": "CVE-2018-3693" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://access.redhat.com/errata/rhsa-2019:1946" }, { "trust": 2.5, "url": "https://access.redhat.com/errata/rhsa-2020:0174" }, { "trust": 2.4, "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "trust": 2.2, "url": "https://access.redhat.com/errata/rhsa-2018:2384" }, { "trust": 2.2, "url": "https://access.redhat.com/errata/rhsa-2018:2390" }, { "trust": 2.2, "url": "https://access.redhat.com/errata/rhsa-2018:2395" }, { "trust": 2.1, "url": "https://security.netapp.com/advisory/ntap-20180823-0001/" }, { "trust": 1.8, "url": "https://cdrdv2.intel.com/v1/dl/getcontent/685359" }, { "trust": 1.8, "url": "https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0" }, { "trust": 1.8, "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "trust": 1.8, "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "trust": 1.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3693" }, { "trust": 0.9, "url": "https://www.suse.com/support/kb/doc/?id=7023075" }, { "trust": 0.9, "url": "https://01.org/security/advisories/intel-oss-10002" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2018-3693" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3693" }, { "trust": 0.6, "url": "https://thehackernews.com/2018/07/intel-spectre-vulnerability.html" }, { "trust": 0.6, "url": "https://support.f5.com/csp/article/k54252492" }, { "trust": 0.6, "url": "https://fortiguard.com/psirt/fg-ir-18-002" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss?uid=ibm10872142" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/75922" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3234.2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3234.3/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/76682" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0226/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2861/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/153815/red-hat-security-advisory-2019-1946-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156020/red-hat-security-advisory-2020-0174-01.html" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss?uid=ibm10872470" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.1926/" }, { "trust": 0.6, "url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10872142" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.1899/" }, { "trust": 0.5, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.5, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.5, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "http://www.amd.com/en-gb" }, { "trust": 0.3, "url": "https://www.arm.com/" }, { "trust": 0.3, "url": "http://www.intel.com/content/www/us/en/homepage.html" }, { "trust": 0.3, "url": "https://www.intel.in/content/www/in/en/support/articles/000029382/processors.html" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "trust": 0.3, "url": "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-has-announced-a-release-for-ibm-security-identity-governance-and-intelligence-in-response-to-multiple-security-vulnerabilities-2/" }, { "trust": 0.3, "url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10742755" }, { "trust": 0.3, "url": "https://people.csail.mit.edu/vlk/spectre11.pdf" }, { "trust": 0.3, "url": "https://access.redhat.com/security/vulnerabilities/l1tf" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-7566" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-3620" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7566" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3620" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3646" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-3646" }, { "trust": 0.2, "url": "https://access.redhat.com/solutions/3523601" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13215" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5390" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-13215" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10675" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-5390" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-10675" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/github-3rr0r/teapot" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=58431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14815" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14815" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18660" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-18559" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-3846" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17133" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3846" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8912" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14816" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11487" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-11487" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10126" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-18559" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8912" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-18660" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14814" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14816" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17133" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14814" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10126" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15129" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-12154" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14633" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12154" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-14633" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15274" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-15129" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-15274" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15265" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-15265" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1000004" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-0861" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-0861" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10901" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000004" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10901" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/3527791" } ], "sources": [ { "db": "VULHUB", "id": "VHN-133724" }, { "db": "VULMON", "id": "CVE-2018-3693" }, { "db": "BID", "id": "108004" }, { "db": "JVNDB", "id": "JVNDB-2018-005796" }, { "db": "PACKETSTORM", "id": "156020" }, { "db": "PACKETSTORM", "id": "148907" }, { "db": "PACKETSTORM", "id": "153815" }, { "db": "PACKETSTORM", "id": "148898" }, { "db": "PACKETSTORM", "id": "148899" }, { "db": "CNNVD", "id": "CNNVD-201807-884" }, { "db": "NVD", "id": "CVE-2018-3693" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-133724" }, { "db": "VULMON", "id": "CVE-2018-3693" }, { "db": "BID", "id": "108004" }, { "db": "JVNDB", "id": "JVNDB-2018-005796" }, { "db": "PACKETSTORM", "id": "156020" }, { "db": "PACKETSTORM", "id": "148907" }, { "db": "PACKETSTORM", "id": "153815" }, { "db": "PACKETSTORM", "id": "148898" }, { "db": "PACKETSTORM", "id": "148899" }, { "db": "CNNVD", "id": "CNNVD-201807-884" }, { "db": "NVD", "id": "CVE-2018-3693" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-10T00:00:00", "db": "VULHUB", "id": "VHN-133724" }, { "date": "2018-07-10T00:00:00", "db": "VULMON", "id": "CVE-2018-3693" }, { "date": "2018-07-10T00:00:00", "db": "BID", "id": "108004" }, { "date": "2018-07-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-005796" }, { "date": "2020-01-21T19:10:15", "db": "PACKETSTORM", "id": "156020" }, { "date": "2018-08-15T04:40:44", "db": "PACKETSTORM", "id": "148907" }, { "date": "2019-07-30T18:19:52", "db": "PACKETSTORM", "id": "153815" }, { "date": "2018-08-15T04:37:29", "db": "PACKETSTORM", "id": "148898" }, { "date": "2018-08-15T04:37:37", "db": "PACKETSTORM", "id": "148899" }, { "date": "2018-07-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-884" }, { "date": "2018-07-10T21:29:01.340000", "db": "NVD", "id": "CVE-2018-3693" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-19T00:00:00", "db": "VULHUB", "id": "VHN-133724" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2018-3693" }, { "date": "2018-07-10T00:00:00", "db": "BID", "id": "108004" }, { "date": "2018-07-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-005796" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-884" }, { "date": "2024-11-21T04:05:53.970000", "db": "NVD", "id": "CVE-2018-3693" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108004" }, { "db": "CNNVD", "id": "CNNVD-201807-884" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Information disclosure vulnerability in systems with microprocessors", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-005796" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-884" } ], "trust": 0.6 } }
var-201906-1227
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security signature issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1227", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11092" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "cve": "CVE-2019-11092", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11092", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142704", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2019-11092", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-11092", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-573", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142704", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142704" }, { "db": "CNNVD", "id": "CNNVD-201906-573" }, { "db": "NVD", "id": "CVE-2019-11092" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security signature issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-11092" }, { "db": "VULHUB", "id": "VHN-142704" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11092", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-573", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-142704", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142704" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-573" }, { "db": "NVD", "id": "CVE-2019-11092" } ] }, "id": "VAR-201906-1227", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142704" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T20:16:22.073000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142704" }, { "db": "NVD", "id": "CVE-2019-11092" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142704" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-573" }, { "db": "NVD", "id": "CVE-2019-11092" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142704" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-573" }, { "db": "NVD", "id": "CVE-2019-11092" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142704" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-573" }, { "date": "2019-06-13T16:29:01.263000", "db": "NVD", "id": "CVE-2019-11092" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-142704" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-573" }, { "date": "2024-11-21T04:20:31.367000", "db": "NVD", "id": "CVE-2019-11092" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-573" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-573" } ], "trust": 0.6 } }
var-201808-0957
Vulnerability from variot
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. These attacks are known as L1 Terminal Fault: SGX, L1 Terminal Fault: OS/SMM, and L1 Terminal Fault: VMM. Intel Core i3 processor, etc. are all CPU (central processing unit) products of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products that use speculative execution and address translation. The following products are affected: Intel Core i3 processor; Intel Core i5 processor; Intel Core i7 processor; Intel Core M processor family; 2nd generation Intel Core processors; 3rd generation Intel Core processors; 4th generation Intel Core processors; 5th generation Intel Core processors, etc. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. (CVE-2018-3620, CVE-2018-3646)
- A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.
To fully resolve these vulnerabilities it is also necessary to install updated CPU microcode (only available in Debian non-free). Common server class CPUs are covered in the update released as DSA 4273-1.
For the stable distribution (stretch), these problems have been fixed in version 4.9.110-3+deb9u3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2018-10-30-9 Additional information for APPLE-SA-2018-9-24-1 macOS Mojave 10.14
macOS Mojave 10.14 addresses the following:
Bluetooth Available for: iMac (21.5-inch, Late 2012), iMac (27-inch, Late 2012) , iMac (21.5-inch, Late 2013), iMac (21.5-inch, Mid 2014), iMac (Retina 5K, 27-inch, Late 2014), iMac (21.5-inch, Late 2015), Mac mini (Mid 2011), Mac mini Server (Mid 2011), Mac mini (Late 2012) , Mac mini Server (Late 2012), Mac mini (Late 2014), Mac Pro (Late 2013), MacBook Air (11-inch, Mid 2011), MacBook Air (13-inch, Mid 2011), MacBook Air (11-inch, Mid 2012), MacBook Air (13-inch, Mid 2012), MacBook Air (11-inch, Mid 2013), MacBook Air (13-inch, Mid 2013), MacBook Air (11-inch, Early 2015), MacBook Air (13-inch, Early 2015), MacBook Pro (13-inch, Mid 2012), MacBook Pro (15-inch, Mid 2012), MacBook Pro (Retina, 13-inch, Early 2013), MacBook Pro (Retina, 15-inch, Early 2013), MacBook Pro (Retina, 13-inch, Late 2013), and MacBook Pro (Retina, 15-inch, Late 2013) Impact: An attacker in a privileged network position may be able to intercept Bluetooth traffic Description: An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. CVE-2018-5383: Lior Neumann and Eli Biham
The updates below are available for these Mac models: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013, Mid 2010, and Mid 2012 models with recommended Metal-capable graphics processor, including MSI Gaming Radeon RX 560 and Sapphire Radeon PULSE RX 580)
afpserver Impact: A remote attacker may be able to attack AFP servers through HTTP clients Description: An input validation issue was addressed with improved input validation. CVE-2018-4295: Jianjun Chen (@whucjj) from Tsinghua University and UC Berkeley Entry added October 30, 2018
App Store Impact: A malicious application may be able to determine the Apple ID of the owner of the computer Description: A permissions issue existed in the handling of the Apple ID. This issue was addressed with improved access controls. CVE-2018-4324: Sergii Kryvoblotskyi of MacPaw Inc.
AppleGraphicsControl Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4417: Lee of the Information Security Lab Yonsei University working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Application Firewall Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A configuration issue was addressed with additional restrictions. CVE-2018-4353: Abhinav Bansal of LinkedIn Inc.
APR Impact: Multiple buffer overflow issues existed in Perl Description: Multiple issues in Perl were addressed with improved memory handling. CVE-2017-12613: Craig Young of Tripwire VERT CVE-2017-12618: Craig Young of Tripwire VERT Entry added October 30, 2018
ATS Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
ATS Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4308: Mohamed Ghannam (@_simo36) Entry added October 30, 2018
Auto Unlock Impact: A malicious application may be able to access local users AppleIDs Description: A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. CVE-2018-4321: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc.
CFNetwork Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
CoreFoundation Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4412: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018
CoreFoundation Impact: An application may be able to gain elevated privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4414: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018
CoreText Impact: Processing a maliciously crafted text file may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2018-4347: an anonymous researcher Entry added October 30, 2018
Crash Reporter Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4333: Brandon Azad
CUPS Impact: In certain configurations, a remote attacker may be able to replace the message content from the print server with arbitrary content Description: An injection issue was addressed with improved validation. CVE-2018-4153: Michael Hanselmann of hansmi.ch Entry added October 30, 2018
CUPS Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A denial of service issue was addressed with improved validation. CVE-2018-4406: Michael Hanselmann of hansmi.ch Entry added October 30, 2018
Dictionary Impact: Parsing a maliciously crafted dictionary file may lead to disclosure of user information Description: A validation issue existed which allowed local file access. This was addressed with input sanitization. CVE-2018-4346: Wojciech ReguAa (@_r3ggi) of SecuRing Entry added October 30, 2018
Grand Central Dispatch Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4426: Brandon Azad Entry added October 30, 2018
Heimdal Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-3646: Baris Kasikci, Daniel Genkin, Ofir Weisse, and Thomas F. Wenisch of University of Michigan, Mark Silberstein and Marina Minkin of Technion, Raoul Strackx, Jo Van Bulck, and Frank Piessens of KU Leuven, Rodrigo Branco, Henrique Kawakami, Ke Sun, and Kekai Hu of Intel Corporation, Yuval Yarom of The University of Adelaide Entry added October 30, 2018
iBooks Impact: Parsing a maliciously crafted iBooks file may lead to disclosure of user information Description: A configuration issue was addressed with additional restrictions. CVE-2018-4355: evi1m0 of bilibili security team Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4396: Yu Wang of Didi Research America CVE-2018-4418: Yu Wang of Didi Research America Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to read restricted memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2018-4351: Appology Team @ Theori working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4350: Yu Wang of Didi Research America Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4334: Ian Beer of Google Project Zero Entry added October 30, 2018
IOHIDFamily Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation CVE-2018-4408: Ian Beer of Google Project Zero Entry added October 30, 2018
IOKit Impact: A malicious application may be able to break out of its sandbox Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4341: Ian Beer of Google Project Zero CVE-2018-4354: Ian Beer of Google Project Zero Entry added October 30, 2018
IOKit Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2018-4383: Apple Entry added October 30, 2018
IOUserEthernet Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4401: Apple Entry added October 30, 2018
Kernel Impact: A malicious application may be able to leak sensitive user information Description: An access issue existed with privileged API calls. This issue was addressed with additional restrictions. CVE-2018-4399: Fabiano Anemone (@anoane) Entry added October 30, 2018
Kernel Impact: An attacker in a privileged network position may be able to execute arbitrary code Description: A memory corruption issue was addressed with improved validation. CVE-2018-4407: Kevin Backhouse of Semmle Ltd. Entry added October 30, 2018
Kernel Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4336: Brandon Azad CVE-2018-4337: Ian Beer of Google Project Zero CVE-2018-4340: Mohamed Ghannam (@_simo36) CVE-2018-4344: The UK's National Cyber Security Centre (NCSC) CVE-2018-4425: cc working with Trend Micro's Zero Day Initiative, Juwei Lin (@panicaII) of Trend Micro working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
LibreSSL Impact: Multiple issues in libressl were addressed in this update Description: Multiple issues were addressed by updating to libressl version 2.6.4. CVE-2015-3194 CVE-2015-5333 CVE-2015-5334 CVE-2016-702 Entry added October 30, 2018
Login Window Impact: A local user may be able to cause a denial of service Description: A validation issue was addressed with improved logic. CVE-2018-4348: Ken Gannon of MWR InfoSecurity and Christian Demko of MWR InfoSecurity Entry added October 30, 2018
mDNSOffloadUserClient Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4326: an anonymous researcher working with Trend Micro's Zero Day Initiative, Zhuo Liang of Qihoo 360 Nirvan Team Entry added October 30, 2018
MediaRemote Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with additional sandbox restrictions. This ensures that older data read from recently-written-to addresses cannot be read via a speculative side-channel. CVE-2018-3639: Jann Horn (@tehjh) of Google Project Zero (GPZ), Ken Johnson of the Microsoft Security Response Center (MSRC) Entry added October 30, 2018
Security Impact: A local user may be able to cause a denial of service Description: This issue was addressed with improved checks. CVE-2018-4395: Patrick Wardle of Digita Security Entry added October 30, 2018
Security Impact: An attacker may be able to exploit weaknesses in the RC4 cryptographic algorithm Description: This issue was addressed by removing RC4. CVE-2016-1777: Pepi Zawodsky
Spotlight Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4393: Lufeng Li Entry added October 30, 2018
Symptom Framework Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4203: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Text Impact: Processing a maliciously crafted text file may lead to a denial of service Description: A denial of service issue was addressed with improved validation. CVE-2018-4304: jianan.huang (@Sevck) Entry added October 30, 2018
Wi-Fi Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4338: Lee @ SECLAB, Yonsei University working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Additional recognition
Accessibility Framework We would like to acknowledge Ryan Govostes for their assistance.
Core Data We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance.
CoreDAV We would like to acknowledge an anonymous researcher for their assistance.
CoreGraphics We would like to acknowledge Nitin Arya of Roblox Corporation for their assistance.
CoreSymbolication We would like to acknowledge Brandon Azad for their assistance.
IOUSBHostFamily We would like to acknowledge an anonymous researcher for their assistance.
Kernel We would like to acknowledge Brandon Azad for their assistance.
Mail We would like to acknowledge Alessandro Avagliano of Rocket Internet SE, John Whitehead of The New York Times, Kelvin Delbarre of Omicron Software Systems, and Zbyszek A>>A3Akiewski for their assistance.
Quick Look We would like to acknowledge Wojciech ReguAa (@_r3ggi) of SecuRing and Patrick Wardle of Digita Security and lokihardt of Google Project Zero for their assistance.
Security We would like to acknowledge Christoph Sinai, Daniel Dudek (@dannysapples) of The Irish Times and Filip KlubiAka (@lemoncloak) of ADAPT Centre, Dublin Institute of Technology, Istvan Csanady of Shapr3D, Omar Barkawi of ITG Software, Inc., Phil Caleno, Wilson Ding, and an anonymous researcher for their assistance.
SQLite We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance.
Terminal We would like to acknowledge an anonymous researcher for their assistance.
WindowServer We would like to acknowledge Patrick Wardle of Digita Security for their assistance.
Installation note:
macOS Mojave 10.14 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlvYkgYpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3GrtxAA iVBcAdusz88zFzkT05EIxb9nSp4CGOlhKlChK4N7Db17o2fNT0hNpQixEAC0wC/A zqIzsXEzZlPobI4OnwiEVs7lVBsvCW+IarrRZ8pgSllKs1VlbNfOO3z9vB5BqJMr d9PjPvtHyG3jZmWqQPIjvJb3l3ZjHAt+HAvTItNMkhIUjqV80JI8wP3erzIf3tAt VoLIw5iL5w4HAYcWsn9DYcecXZdv39MnKL5UGzMX3bkee2U7kGYtgskU+mdPa1Wl WzquIPlLeKL2KNSXEfbkPtcKM/fvkURsNzEDvg+PBQLdI3JeR1bOeN24aiTEtiEL TecGm/kKMMJWmDdhPhFvZVD+SIdZd4LgbTawR1UE1JJg7jnEZKCvZ45mXd2eBwn/ rpEKCLBsgA59GILs3ZjZSIWskRJPzZrt463AKcN2wukkTUUkY1rhRVdOf6LZMs9Z w9iJOua3vt+HzCCxTEaH53WUeM6fn/Yeq+DGIS5Fk0G09pU7tsyJVwj3o1nJn0dl e2mcrXBJeSmi6bvvkJX45y/Y8E8Qr+ovS4uN8wG6DOWcCBQkDkugabng8vNh8GST 1wNnV9JY/CmYbU0ZIwKbbSDkcQLQuIl7kKaZMHnU74EytcKscUqqx1VqINz1tssu 1wZZGLtg3VubrZOsnUZzumD+0nI8c6QAnQK3P2PSZ0k= =i9YR -----END PGP SIGNATURE----- . 6.6) - noarch, x86_64
-
(CVE-2018-3620, CVE-2018-3646)
-
kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. 5.9 server) - i386, noarch, x86_64
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2387-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2387 Issue date: 2018-08-14 CVE Names: CVE-2018-3620 CVE-2018-3639 CVE-2018-3646 ==================================================================== 1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.4) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.4) - ppc64, ppc64le, x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
-
Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
-
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.
Bug Fix(es):
-
Previously, configurations with the little-endian variant of IBM Power Systems CPU architectures and Hard Disk Drives (HDD) designed according to Nonvolatile Memory Express (NVMe) open standards, experienced crashes during shutdown or reboot due to race conditions of CPUs. As a consequence, the sysfs pseudo file system threw a stack trace report about an attempt to create a duplicate entry in sysfs. This update modifies the source code so that the irq_dispose_mapping() function is called first and the msi_bitmap_free_hwirqs() function is called afterwards. As a result, the race condition no longer appears in the described scenario. (BZ#1570510)
-
When switching from the indirect branch speculation (IBRS) feature to the retpolines feature, the IBRS state of some CPUs was sometimes not handled correctly. Consequently, some CPUs were left with the IBRS Model-Specific Register (MSR) bit set to 1, which could lead to performance issues. With this update, the underlying source code has been fixed to clear the IBRS MSR bits correctly, thus fixing the bug. (BZ#1586147)
-
During a balloon reset, page pointers were not correctly initialized after unmapping the memory. Consequently, on the VMware ESXi hypervisor with "Fault Tolerance" and "ballooning" enabled, the following messages repeatedly occurred in the kernel log:
[3014611.640148] WARNING: at mm/vmalloc.c:1491 __vunmap+0xd3/0x100() [3014611.640269] Trying to vfree() nonexistent vm area (ffffc90000697000)
With this update, the underlying source code has been fixed to initialize page pointers properly. As a result, the mm/vmalloc.c warnings no longer occur under the described circumstances. (BZ#1595600)
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1566890 - CVE-2018-3639 hw: cpu: speculative store bypass 1585005 - CVE-2018-3646 Kernel: hw: cpu: L1 terminal fault (L1TF)
- Package List:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.4):
Source: kernel-3.10.0-693.37.4.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-693.37.4.el7.noarch.rpm kernel-doc-3.10.0-693.37.4.el7.noarch.rpm
x86_64: kernel-3.10.0-693.37.4.el7.x86_64.rpm kernel-debug-3.10.0-693.37.4.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.37.4.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.37.4.el7.x86_64.rpm kernel-devel-3.10.0-693.37.4.el7.x86_64.rpm kernel-headers-3.10.0-693.37.4.el7.x86_64.rpm kernel-tools-3.10.0-693.37.4.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.37.4.el7.x86_64.rpm perf-3.10.0-693.37.4.el7.x86_64.rpm perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm python-perf-3.10.0-693.37.4.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4):
x86_64: kernel-debug-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.37.4.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.37.4.el7.x86_64.rpm perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 7.4):
Source: kernel-3.10.0-693.37.4.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-693.37.4.el7.noarch.rpm kernel-doc-3.10.0-693.37.4.el7.noarch.rpm
ppc64: kernel-3.10.0-693.37.4.el7.ppc64.rpm kernel-bootwrapper-3.10.0-693.37.4.el7.ppc64.rpm kernel-debug-3.10.0-693.37.4.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm kernel-debug-devel-3.10.0-693.37.4.el7.ppc64.rpm kernel-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-693.37.4.el7.ppc64.rpm kernel-devel-3.10.0-693.37.4.el7.ppc64.rpm kernel-headers-3.10.0-693.37.4.el7.ppc64.rpm kernel-tools-3.10.0-693.37.4.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm kernel-tools-libs-3.10.0-693.37.4.el7.ppc64.rpm perf-3.10.0-693.37.4.el7.ppc64.rpm perf-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm python-perf-3.10.0-693.37.4.el7.ppc64.rpm python-perf-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm
ppc64le: kernel-3.10.0-693.37.4.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-693.37.4.el7.ppc64le.rpm kernel-debug-3.10.0-693.37.4.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.37.4.el7.ppc64le.rpm kernel-devel-3.10.0-693.37.4.el7.ppc64le.rpm kernel-headers-3.10.0-693.37.4.el7.ppc64le.rpm kernel-tools-3.10.0-693.37.4.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm kernel-tools-libs-3.10.0-693.37.4.el7.ppc64le.rpm perf-3.10.0-693.37.4.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm python-perf-3.10.0-693.37.4.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm
s390x: kernel-3.10.0-693.37.4.el7.s390x.rpm kernel-debug-3.10.0-693.37.4.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-693.37.4.el7.s390x.rpm kernel-debug-devel-3.10.0-693.37.4.el7.s390x.rpm kernel-debuginfo-3.10.0-693.37.4.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-693.37.4.el7.s390x.rpm kernel-devel-3.10.0-693.37.4.el7.s390x.rpm kernel-headers-3.10.0-693.37.4.el7.s390x.rpm kernel-kdump-3.10.0-693.37.4.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-693.37.4.el7.s390x.rpm kernel-kdump-devel-3.10.0-693.37.4.el7.s390x.rpm perf-3.10.0-693.37.4.el7.s390x.rpm perf-debuginfo-3.10.0-693.37.4.el7.s390x.rpm python-perf-3.10.0-693.37.4.el7.s390x.rpm python-perf-debuginfo-3.10.0-693.37.4.el7.s390x.rpm
x86_64: kernel-3.10.0-693.37.4.el7.x86_64.rpm kernel-debug-3.10.0-693.37.4.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.37.4.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.37.4.el7.x86_64.rpm kernel-devel-3.10.0-693.37.4.el7.x86_64.rpm kernel-headers-3.10.0-693.37.4.el7.x86_64.rpm kernel-tools-3.10.0-693.37.4.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.37.4.el7.x86_64.rpm perf-3.10.0-693.37.4.el7.x86_64.rpm perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm python-perf-3.10.0-693.37.4.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 7.4):
ppc64: kernel-debug-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm kernel-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-693.37.4.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-693.37.4.el7.ppc64.rpm perf-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm python-perf-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm
ppc64le: kernel-debug-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm kernel-debug-devel-3.10.0-693.37.4.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.37.4.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-693.37.4.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm
x86_64: kernel-debug-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.37.4.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.37.4.el7.x86_64.rpm perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2018-3620 https://access.redhat.com/security/cve/CVE-2018-3639 https://access.redhat.com/security/cve/CVE-2018-3646 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/L1TF
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBW3M4idzjgjWX9erEAQigJg//W8NS9ZAq71IYQ/6q5hTZBUeg3RsIJL4U OOCTlpLe3pH45ueU4Pm1HPopyyBHLGo988ZXPkH4z/jKW6txO3RDzf/blyWIwxwi dr76FUaMMLUk0ASeGcisZppOt/6zwrp2tfn+TyiC3pK0K5nTp+WVO5xYy5iecXVX 96M3wIhCIlshYPc1/F8zdYuBFzpYgBnotag//FjyCQlhmOFcKtTRgyQrSuf1ZxnL VNQ7UuVGjPWeF0w0OJrb6U7+pVrlwAvtwYkUjm/eFh/AszTe7uZ6C6mG8XAobDrl SpxhyqMTcplrKxvl0S01xuezVbVo8RdoAtrW9+xseozknta4cu7RHe0ZSsonY/xN RiAingIwsVde+g9KOv8jeleACBZu8mmJptkYbVb1IHPcp+1FzXXAkUc1i/oc7XBU lIfe49O3L2GyhI+0hUwhbPuc51L8yHmpr39KM1irKIRWsY692n32LVns3L6Kr0tW iWlhz4F2e5SNb2zlu3sMRQ4M0kf6JPX8VdRL1qMpfNoa9Ci4wYt+zP29//F6swji uwu3+SVH5VTW9VzymSCaQl/gD0loWPKVLFrTF5M9Y9+cl0uXn7CoW2LUNB86PhRz mMG+g2ZW9WbKcW/ERHofeii5WZGtsyA4FnUaWhzetfQIItEpmoobE9QVl0ar5GJ2 dsE8Ald7hA4=scjp -----END PGP SIGNATURE-----
-- RHSA-announce mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhsa-announce . 6.4) - x86_64
- Relevant releases/architectures:
RHEL 7-based RHEV-H ELS - noarch RHEV Hypervisor for RHEL-6 ELS - noarch
- Gentoo Linux Security Advisory GLSA 201810-06
https://security.gentoo.org/
Severity: Normal Title: Xen: Multiple vulnerabilities Date: October 30, 2018 Bugs: #643350, #655188, #655544, #659442 ID: 201810-06
Synopsis
Multiple vulnerabilities have been found in Xen, the worst of which could cause a Denial of Service condition.
Background
Xen is a bare-metal hypervisor.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulation/xen < 4.10.1-r2 >= 4.10.1-r2 2 app-emulation/xen-tools < 4.10.1-r2 >= 4.10.1-r2 ------------------------------------------------------------------- 2 affected packages
Description
Multiple vulnerabilities have been discovered in Xen. Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Xen users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.10.1-r2"
All Xen tools users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.10.1-r2"
References
[ 1 ] CVE-2017-5715 https://nvd.nist.gov/vuln/detail/CVE-2017-5715 [ 2 ] CVE-2017-5753 https://nvd.nist.gov/vuln/detail/CVE-2017-5753 [ 3 ] CVE-2017-5754 https://nvd.nist.gov/vuln/detail/CVE-2017-5754 [ 4 ] CVE-2018-10471 https://nvd.nist.gov/vuln/detail/CVE-2018-10471 [ 5 ] CVE-2018-10472 https://nvd.nist.gov/vuln/detail/CVE-2018-10472 [ 6 ] CVE-2018-10981 https://nvd.nist.gov/vuln/detail/CVE-2018-10981 [ 7 ] CVE-2018-10982 https://nvd.nist.gov/vuln/detail/CVE-2018-10982 [ 8 ] CVE-2018-12891 https://nvd.nist.gov/vuln/detail/CVE-2018-12891 [ 9 ] CVE-2018-12892 https://nvd.nist.gov/vuln/detail/CVE-2018-12892 [ 10 ] CVE-2018-12893 https://nvd.nist.gov/vuln/detail/CVE-2018-12893 [ 11 ] CVE-2018-15468 https://nvd.nist.gov/vuln/detail/CVE-2018-15468 [ 12 ] CVE-2018-15469 https://nvd.nist.gov/vuln/detail/CVE-2018-15469 [ 13 ] CVE-2018-15470 https://nvd.nist.gov/vuln/detail/CVE-2018-15470 [ 14 ] CVE-2018-3620 https://nvd.nist.gov/vuln/detail/CVE-2018-3620 [ 15 ] CVE-2018-3646 https://nvd.nist.gov/vuln/detail/CVE-2018-3646 [ 16 ] CVE-2018-5244 https://nvd.nist.gov/vuln/detail/CVE-2018-5244 [ 17 ] CVE-2018-7540 https://nvd.nist.gov/vuln/detail/CVE-2018-7540 [ 18 ] CVE-2018-7541 https://nvd.nist.gov/vuln/detail/CVE-2018-7541 [ 19 ] CVE-2018-7542 https://nvd.nist.gov/vuln/detail/CVE-2018-7542
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201810-06
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to [email protected] or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201808-0957", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "930" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "720qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2655le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y31" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6585r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8550u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150t" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10c" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "740qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920xm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3630qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4720hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4000m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2405s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8100" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2435m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3380m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2410m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3317u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700ec" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3339y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "460m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2620m" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y32" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2960xm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "840qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4500u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4400e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5750hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2760qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "650" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6685r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "970" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5550u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3225" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6260u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "875k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350h" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3840qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4308u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2920xm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2340ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712mq" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y30" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3230m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2720qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775c" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3227u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "*" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675c" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702mq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5557u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5157u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2629m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2380p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5257u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700mq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4005u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640lm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600t" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y57" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "820qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2675qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5300u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3475s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340te" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310u" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2637m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5200u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "580m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4260u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4750hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4785t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4722hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5500u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8650u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2375m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5600u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430um" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3720qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770te" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820eq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "670" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "960" }, { "model": "core m7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y75" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2102" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440eq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610me" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2700k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "470um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2649m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6402p" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "610e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2300" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660lm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2390t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2617m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2515e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3667u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2467m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2557m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4578u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4800mq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "350m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2550k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3689y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4910mq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hk" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6287u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3350p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4202y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3437u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100h" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700eq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7500u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8250u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2320" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6157u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4550u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3520m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7660u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4410e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980x" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y51" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4250u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "370m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2430m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2357m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6006u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4158u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217ue" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3360m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2348m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4012y" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y70" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4771" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3229y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5650u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620ue" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "480m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620lm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4278u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3130m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6200u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4510u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2640m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200m" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y71" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2125" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2370m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3427u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5575r" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4558u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710mq" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y30" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2630qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517ue" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4422e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3320m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3245" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2510e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2312m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3632qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5015u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6267u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3687u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3635qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6167u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7567u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4765t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "965" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3115c" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5287u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940xm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660ue" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "975" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2635qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4760hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "655k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200h" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "990x" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4102e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8600k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4960hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4810mq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7600u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5950hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210h" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6442eq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3439y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2365m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6098p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120me" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7560u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4288u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y75" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4900mq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2537m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6102e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3555le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5020u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "661" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2677m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4302y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4258u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3337u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2657m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5010u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5250u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2377m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2115c" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2710qe" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "880" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3820qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2520m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4120u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2350m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4220y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2367m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3740qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6350hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4980hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6320" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5005u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2715qe" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4020y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2130" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "450m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850hq" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10a" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2610ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "390m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2328m" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y54" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380um" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2105" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4025u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6360u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7920hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3537u" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#982149" }, { "db": "NVD", "id": "CVE-2018-3646" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "148941" }, { "db": "PACKETSTORM", "id": "148904" }, { "db": "PACKETSTORM", "id": "149143" }, { "db": "PACKETSTORM", "id": "148902" }, { "db": "PACKETSTORM", "id": "148905" }, { "db": "PACKETSTORM", "id": "148946" } ], "trust": 0.6 }, "cve": "CVE-2018-3646", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2018-3646", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-133677", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2018-3646", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2018-3646", "trust": 1.0, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-133677", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-3646", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-133677" }, { "db": "VULMON", "id": "CVE-2018-3646" }, { "db": "NVD", "id": "CVE-2018-3646" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. These attacks are known as L1 Terminal Fault: SGX, L1 Terminal Fault: OS/SMM, and L1 Terminal Fault: VMM. Intel Core i3 processor, etc. are all CPU (central processing unit) products of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products that use speculative execution and address translation. The following products are affected: Intel Core i3 processor; Intel Core i5 processor; Intel Core i7 processor; Intel Core M processor family; 2nd generation Intel Core processors; 3rd generation Intel Core processors; 4th generation Intel Core processors; 5th generation Intel Core processors, etc. These packages include redhat-release-virtualization-host,\novirt-node, and rhev-hypervisor. RHVH features a Cockpit user\ninterface for monitoring the host\u0027s resources and performing administrative\ntasks. (CVE-2018-3620,\nCVE-2018-3646)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled\nspecially crafted TCP packets. A remote attacker could use this flaw to\ntrigger time and calculation expensive calls to tcp_collapse_ofo_queue()\nand tcp_prune_ofo_queue() functions by sending specially modified packets\nwithin ongoing TCP sessions which could lead to a CPU saturation and hence\na denial of service on the system. Maintaining the denial of service\ncondition requires continuous two-way TCP sessions to a reachable open\nport, thus the attacks cannot be performed using spoofed IP addresses. \n\nTo fully resolve these vulnerabilities it is also necessary to install\nupdated CPU microcode (only available in Debian non-free). Common server\nclass CPUs are covered in the update released as DSA 4273-1. \n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 4.9.110-3+deb9u3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2018-10-30-9 Additional information for\nAPPLE-SA-2018-9-24-1 macOS Mojave 10.14\n\nmacOS Mojave 10.14 addresses the following:\n\nBluetooth\nAvailable for: iMac (21.5-inch, Late 2012), iMac (27-inch, Late 2012)\n, iMac (21.5-inch, Late 2013), iMac (21.5-inch, Mid 2014), iMac\n(Retina 5K, 27-inch, Late 2014), iMac (21.5-inch, Late 2015),\nMac mini (Mid 2011), Mac mini Server (Mid 2011), Mac mini (Late 2012)\n, Mac mini Server (Late 2012), Mac mini (Late 2014), Mac Pro\n(Late 2013), MacBook Air (11-inch, Mid 2011), MacBook Air\n(13-inch, Mid 2011), MacBook Air (11-inch, Mid 2012), MacBook Air\n(13-inch, Mid 2012), MacBook Air (11-inch, Mid 2013), MacBook Air\n(13-inch, Mid 2013), MacBook Air (11-inch, Early 2015), MacBook Air\n(13-inch, Early 2015), MacBook Pro (13-inch, Mid 2012), MacBook Pro\n(15-inch, Mid 2012), MacBook Pro (Retina, 13-inch, Early 2013),\nMacBook Pro (Retina, 15-inch, Early 2013), MacBook Pro (Retina,\n13-inch, Late 2013), and MacBook Pro (Retina, 15-inch, Late 2013)\nImpact: An attacker in a privileged network position may be able to\nintercept Bluetooth traffic\nDescription: An input validation issue existed in Bluetooth. This\nissue was addressed with improved input validation. \nCVE-2018-5383: Lior Neumann and Eli Biham\n\nThe updates below are available for these Mac models:\nMacBook (Early 2015 and later), MacBook Air (Mid 2012 and later),\nMacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later),\niMac (Late 2012 and later), iMac Pro (all models), Mac Pro\n(Late 2013, Mid 2010, and Mid 2012 models with recommended\nMetal-capable graphics processor, including MSI Gaming Radeon RX 560\nand Sapphire Radeon PULSE RX 580)\n\nafpserver\nImpact: A remote attacker may be able to attack AFP servers through\nHTTP clients\nDescription: An input validation issue was addressed with improved\ninput validation. \nCVE-2018-4295: Jianjun Chen (@whucjj) from Tsinghua University and UC\nBerkeley\nEntry added October 30, 2018\n\nApp Store\nImpact: A malicious application may be able to determine the Apple ID\nof the owner of the computer\nDescription: A permissions issue existed in the handling of the Apple\nID. This issue was addressed with improved access controls. \nCVE-2018-4324: Sergii Kryvoblotskyi of MacPaw Inc. \n\nAppleGraphicsControl\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4417: Lee of the Information Security Lab Yonsei University\nworking with Trend Micro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nApplication Firewall\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A configuration issue was addressed with additional\nrestrictions. \nCVE-2018-4353: Abhinav Bansal of LinkedIn Inc. \n\nAPR\nImpact: Multiple buffer overflow issues existed in Perl\nDescription: Multiple issues in Perl were addressed with improved\nmemory handling. \nCVE-2017-12613: Craig Young of Tripwire VERT\nCVE-2017-12618: Craig Young of Tripwire VERT\nEntry added October 30, 2018\n\nATS\nImpact: A malicious application may be able to elevate privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend\nMicro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nATS\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2018-4308: Mohamed Ghannam (@_simo36)\nEntry added October 30, 2018\n\nAuto Unlock\nImpact: A malicious application may be able to access local users\nAppleIDs\nDescription: A validation issue existed in the entitlement\nverification. This issue was addressed with improved validation of\nthe process entitlement. \nCVE-2018-4321: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc. \n\nCFNetwork\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nCoreFoundation\nImpact: A malicious application may be able to elevate privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4412: The UK\u0027s National Cyber Security Centre (NCSC)\nEntry added October 30, 2018\n\nCoreFoundation\nImpact: An application may be able to gain elevated privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4414: The UK\u0027s National Cyber Security Centre (NCSC)\nEntry added October 30, 2018\n\nCoreText\nImpact: Processing a maliciously crafted text file may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2018-4347: an anonymous researcher\nEntry added October 30, 2018\n\nCrash Reporter\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4333: Brandon Azad\n\nCUPS\nImpact: In certain configurations, a remote attacker may be able to\nreplace the message content from the print server with arbitrary\ncontent\nDescription: An injection issue was addressed with improved\nvalidation. \nCVE-2018-4153: Michael Hanselmann of hansmi.ch\nEntry added October 30, 2018\n\nCUPS\nImpact: An attacker in a privileged position may be able to perform a\ndenial of service attack\nDescription: A denial of service issue was addressed with improved\nvalidation. \nCVE-2018-4406: Michael Hanselmann of hansmi.ch\nEntry added October 30, 2018\n\nDictionary\nImpact: Parsing a maliciously crafted dictionary file may lead to\ndisclosure of user information\nDescription: A validation issue existed which allowed local file\naccess. This was addressed with input sanitization. \nCVE-2018-4346: Wojciech ReguAa (@_r3ggi) of SecuRing\nEntry added October 30, 2018\n\nGrand Central Dispatch\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4426: Brandon Azad\nEntry added October 30, 2018\n\nHeimdal\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-3646: Baris Kasikci, Daniel Genkin, Ofir Weisse, and Thomas\nF. Wenisch of University of Michigan, Mark Silberstein and Marina\nMinkin of Technion, Raoul Strackx, Jo Van Bulck, and Frank Piessens\nof KU Leuven, Rodrigo Branco, Henrique Kawakami, Ke Sun, and Kekai Hu\nof Intel Corporation, Yuval Yarom of The University of Adelaide\nEntry added October 30, 2018\n\niBooks\nImpact: Parsing a maliciously crafted iBooks file may lead to\ndisclosure of user information\nDescription: A configuration issue was addressed with additional\nrestrictions. \nCVE-2018-4355: evi1m0 of bilibili security team\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4396: Yu Wang of Didi Research America\nCVE-2018-4418: Yu Wang of Didi Research America\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to read restricted memory\nDescription: A memory initialization issue was addressed with\nimproved memory handling. \nCVE-2018-4351: Appology Team @ Theori working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4350: Yu Wang of Didi Research America\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4334: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOHIDFamily\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation\nCVE-2018-4408: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOKit\nImpact: A malicious application may be able to break out of its\nsandbox\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4341: Ian Beer of Google Project Zero\nCVE-2018-4354: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOKit\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2018-4383: Apple\nEntry added October 30, 2018\n\nIOUserEthernet\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4401: Apple\nEntry added October 30, 2018\n\nKernel\nImpact: A malicious application may be able to leak sensitive user\ninformation\nDescription: An access issue existed with privileged API calls. This\nissue was addressed with additional restrictions. \nCVE-2018-4399: Fabiano Anemone (@anoane)\nEntry added October 30, 2018\n\nKernel\nImpact: An attacker in a privileged network position may be able to\nexecute arbitrary code\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2018-4407: Kevin Backhouse of Semmle Ltd. \nEntry added October 30, 2018\n\nKernel\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4336: Brandon Azad\nCVE-2018-4337: Ian Beer of Google Project Zero\nCVE-2018-4340: Mohamed Ghannam (@_simo36)\nCVE-2018-4344: The UK\u0027s National Cyber Security Centre (NCSC)\nCVE-2018-4425: cc working with Trend Micro\u0027s Zero Day Initiative,\nJuwei Lin (@panicaII) of Trend Micro working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nLibreSSL\nImpact: Multiple issues in libressl were addressed in this update\nDescription: Multiple issues were addressed by updating to libressl\nversion 2.6.4. \nCVE-2015-3194\nCVE-2015-5333\nCVE-2015-5334\nCVE-2016-702\nEntry added October 30, 2018\n\nLogin Window\nImpact: A local user may be able to cause a denial of service\nDescription: A validation issue was addressed with improved logic. \nCVE-2018-4348: Ken Gannon of MWR InfoSecurity and Christian Demko of\nMWR InfoSecurity\nEntry added October 30, 2018\n\nmDNSOffloadUserClient\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4326: an anonymous researcher working with Trend Micro\u0027s\nZero Day Initiative, Zhuo Liang of Qihoo 360 Nirvan Team\nEntry added October 30, 2018\n\nMediaRemote\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: An access issue was addressed with additional sandbox\nrestrictions. This ensures that older data read from\nrecently-written-to addresses cannot be read via a speculative\nside-channel. \nCVE-2018-3639: Jann Horn (@tehjh) of Google Project Zero (GPZ), Ken\nJohnson of the Microsoft Security Response Center (MSRC)\nEntry added October 30, 2018\n\nSecurity\nImpact: A local user may be able to cause a denial of service\nDescription: This issue was addressed with improved checks. \nCVE-2018-4395: Patrick Wardle of Digita Security\nEntry added October 30, 2018\n\nSecurity\nImpact: An attacker may be able to exploit weaknesses in the RC4\ncryptographic algorithm\nDescription: This issue was addressed by removing RC4. \nCVE-2016-1777: Pepi Zawodsky\n\nSpotlight\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4393: Lufeng Li\nEntry added October 30, 2018\n\nSymptom Framework\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2018-4203: Bruno Keith (@bkth_) working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nText\nImpact: Processing a maliciously crafted text file may lead to a\ndenial of service\nDescription: A denial of service issue was addressed with improved\nvalidation. \nCVE-2018-4304: jianan.huang (@Sevck)\nEntry added October 30, 2018\n\nWi-Fi\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4338: Lee @ SECLAB, Yonsei University working with Trend\nMicro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nAdditional recognition\n\nAccessibility Framework\nWe would like to acknowledge Ryan Govostes for their assistance. \n\nCore Data\nWe would like to acknowledge Andreas Kurtz (@aykay) of NESO Security\nLabs GmbH for their assistance. \n\nCoreDAV\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nCoreGraphics\nWe would like to acknowledge Nitin Arya of Roblox Corporation for\ntheir assistance. \n\nCoreSymbolication\nWe would like to acknowledge Brandon Azad for their assistance. \n\nIOUSBHostFamily\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nKernel\nWe would like to acknowledge Brandon Azad for their assistance. \n\nMail\nWe would like to acknowledge Alessandro Avagliano of Rocket Internet\nSE, John Whitehead of The New York Times, Kelvin Delbarre of Omicron\nSoftware Systems, and Zbyszek A\u003e\u003eA3Akiewski for their assistance. \n\nQuick Look\nWe would like to acknowledge Wojciech ReguAa (@_r3ggi) of SecuRing\nand Patrick Wardle of Digita Security and lokihardt of Google Project\nZero for their assistance. \n\nSecurity\nWe would like to acknowledge Christoph Sinai, Daniel Dudek\n(@dannysapples) of The Irish Times and Filip KlubiAka (@lemoncloak)\nof ADAPT Centre, Dublin Institute of Technology, Istvan Csanady of\nShapr3D, Omar Barkawi of ITG Software, Inc., Phil Caleno, Wilson\nDing, and an anonymous researcher for their assistance. \n\nSQLite\nWe would like to acknowledge Andreas Kurtz (@aykay) of NESO Security\nLabs GmbH for their assistance. \n\nTerminal\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nWindowServer\nWe would like to acknowledge Patrick Wardle of Digita Security for\ntheir assistance. \n\nInstallation note:\n\nmacOS Mojave 10.14 may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://support.apple.com/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\n1wZZGLtg3VubrZOsnUZzumD+0nI8c6QAnQK3P2PSZ0k=\n=i9YR\n-----END PGP SIGNATURE-----\n. 6.6) - noarch, x86_64\n\n3. (CVE-2018-3620,\nCVE-2018-3646)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. 5.9 server) - i386, noarch, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel security and bug fix update\nAdvisory ID: RHSA-2018:2387-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:2387\nIssue date: 2018-08-14\nCVE Names: CVE-2018-3620 CVE-2018-3639 CVE-2018-3646\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7.4\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.4) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server EUS (v. 7.4) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 7.4) - ppc64, ppc64le, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to\nefficiently use available system resources and provide inter-domain\nprotection through access control and isolation. The L1TF issue was found\nin the way the x86 microprocessor designs have implemented speculative\nexecution of instructions (a commonly used performance optimisation) in\ncombination with handling of page-faults caused by terminated virtual to\nphysical address resolving process. As a result, an unprivileged attacker\ncould use this flaw to read privileged memory of the kernel or other\nprocesses and/or cross guest/host boundaries to read host memory by\nconducting targeted cache side-channel attacks. (CVE-2018-3620,\nCVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load \u0026 Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor\u0027s data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. \n\nBug Fix(es):\n\n* Previously, configurations with the little-endian variant of IBM Power\nSystems CPU architectures and Hard Disk Drives (HDD) designed according to\nNonvolatile Memory Express (NVMe) open standards, experienced crashes\nduring shutdown or reboot due to race conditions of CPUs. As a consequence,\nthe sysfs pseudo file system threw a stack trace report about an attempt to\ncreate a duplicate entry in sysfs. This update modifies the source code so\nthat the irq_dispose_mapping() function is called first and the\nmsi_bitmap_free_hwirqs() function is called afterwards. As a result, the\nrace condition no longer appears in the described scenario. (BZ#1570510)\n\n* When switching from the indirect branch speculation (IBRS) feature to the\nretpolines feature, the IBRS state of some CPUs was sometimes not handled\ncorrectly. Consequently, some CPUs were left with the IBRS Model-Specific\nRegister (MSR) bit set to 1, which could lead to performance issues. With\nthis update, the underlying source code has been fixed to clear the IBRS\nMSR bits correctly, thus fixing the bug. (BZ#1586147)\n\n* During a balloon reset, page pointers were not correctly initialized\nafter unmapping the memory. Consequently, on the VMware ESXi hypervisor\nwith \"Fault Tolerance\" and \"ballooning\" enabled, the following messages\nrepeatedly occurred in the kernel log:\n\n[3014611.640148] WARNING: at mm/vmalloc.c:1491 __vunmap+0xd3/0x100()\n[3014611.640269] Trying to vfree() nonexistent vm area (ffffc90000697000)\n\nWith this update, the underlying source code has been fixed to initialize\npage pointers properly. As a result, the mm/vmalloc.c warnings no longer\noccur under the described circumstances. (BZ#1595600)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1566890 - CVE-2018-3639 hw: cpu: speculative store bypass\n1585005 - CVE-2018-3646 Kernel: hw: cpu: L1 terminal fault (L1TF)\n\n6. Package List:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.4):\n\nSource:\nkernel-3.10.0-693.37.4.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-693.37.4.el7.noarch.rpm\nkernel-doc-3.10.0-693.37.4.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debug-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-devel-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-headers-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-tools-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-693.37.4.el7.x86_64.rpm\nperf-3.10.0-693.37.4.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\npython-perf-3.10.0-693.37.4.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-693.37.4.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.4):\n\nSource:\nkernel-3.10.0-693.37.4.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-693.37.4.el7.noarch.rpm\nkernel-doc-3.10.0-693.37.4.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-debug-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-devel-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-headers-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-tools-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-693.37.4.el7.ppc64.rpm\nperf-3.10.0-693.37.4.el7.ppc64.rpm\nperf-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm\npython-perf-3.10.0-693.37.4.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm\n\nppc64le:\nkernel-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-debug-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-devel-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-headers-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-tools-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-693.37.4.el7.ppc64le.rpm\nperf-3.10.0-693.37.4.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm\npython-perf-3.10.0-693.37.4.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-693.37.4.el7.s390x.rpm\nkernel-debug-3.10.0-693.37.4.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-693.37.4.el7.s390x.rpm\nkernel-debug-devel-3.10.0-693.37.4.el7.s390x.rpm\nkernel-debuginfo-3.10.0-693.37.4.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-693.37.4.el7.s390x.rpm\nkernel-devel-3.10.0-693.37.4.el7.s390x.rpm\nkernel-headers-3.10.0-693.37.4.el7.s390x.rpm\nkernel-kdump-3.10.0-693.37.4.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-693.37.4.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-693.37.4.el7.s390x.rpm\nperf-3.10.0-693.37.4.el7.s390x.rpm\nperf-debuginfo-3.10.0-693.37.4.el7.s390x.rpm\npython-perf-3.10.0-693.37.4.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-693.37.4.el7.s390x.rpm\n\nx86_64:\nkernel-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debug-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-devel-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-headers-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-tools-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-693.37.4.el7.x86_64.rpm\nperf-3.10.0-693.37.4.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\npython-perf-3.10.0-693.37.4.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 7.4):\n\nppc64:\nkernel-debug-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-693.37.4.el7.ppc64.rpm\nperf-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-693.37.4.el7.ppc64.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-693.37.4.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-693.37.4.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-693.37.4.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.37.4.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-3620\nhttps://access.redhat.com/security/cve/CVE-2018-3639\nhttps://access.redhat.com/security/cve/CVE-2018-3646\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/L1TF\n\n8. Contact:\n\nThe Red Hat security contact is \[email protected]\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\ndsE8Ald7hA4=scjp\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\[email protected]\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. 6.4) - x86_64\n\n3. Relevant releases/architectures:\n\nRHEL 7-based RHEV-H ELS - noarch\nRHEV Hypervisor for RHEL-6 ELS - noarch\n\n3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201810-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Xen: Multiple vulnerabilities\n Date: October 30, 2018\n Bugs: #643350, #655188, #655544, #659442\n ID: 201810-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Xen, the worst of which\ncould cause a Denial of Service condition. \n\nBackground\n==========\n\nXen is a bare-metal hypervisor. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-emulation/xen \u003c 4.10.1-r2 \u003e= 4.10.1-r2\n 2 app-emulation/xen-tools \u003c 4.10.1-r2 \u003e= 4.10.1-r2\n -------------------------------------------------------------------\n 2 affected packages\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Xen. Please review the\nreferenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Xen users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-emulation/xen-4.10.1-r2\"\n\nAll Xen tools users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=app-emulation/xen-tools-4.10.1-r2\"\n\nReferences\n==========\n\n[ 1 ] CVE-2017-5715\n https://nvd.nist.gov/vuln/detail/CVE-2017-5715\n[ 2 ] CVE-2017-5753\n https://nvd.nist.gov/vuln/detail/CVE-2017-5753\n[ 3 ] CVE-2017-5754\n https://nvd.nist.gov/vuln/detail/CVE-2017-5754\n[ 4 ] CVE-2018-10471\n https://nvd.nist.gov/vuln/detail/CVE-2018-10471\n[ 5 ] CVE-2018-10472\n https://nvd.nist.gov/vuln/detail/CVE-2018-10472\n[ 6 ] CVE-2018-10981\n https://nvd.nist.gov/vuln/detail/CVE-2018-10981\n[ 7 ] CVE-2018-10982\n https://nvd.nist.gov/vuln/detail/CVE-2018-10982\n[ 8 ] CVE-2018-12891\n https://nvd.nist.gov/vuln/detail/CVE-2018-12891\n[ 9 ] CVE-2018-12892\n https://nvd.nist.gov/vuln/detail/CVE-2018-12892\n[ 10 ] CVE-2018-12893\n https://nvd.nist.gov/vuln/detail/CVE-2018-12893\n[ 11 ] CVE-2018-15468\n https://nvd.nist.gov/vuln/detail/CVE-2018-15468\n[ 12 ] CVE-2018-15469\n https://nvd.nist.gov/vuln/detail/CVE-2018-15469\n[ 13 ] CVE-2018-15470\n https://nvd.nist.gov/vuln/detail/CVE-2018-15470\n[ 14 ] CVE-2018-3620\n https://nvd.nist.gov/vuln/detail/CVE-2018-3620\n[ 15 ] CVE-2018-3646\n https://nvd.nist.gov/vuln/detail/CVE-2018-3646\n[ 16 ] CVE-2018-5244\n https://nvd.nist.gov/vuln/detail/CVE-2018-5244\n[ 17 ] CVE-2018-7540\n https://nvd.nist.gov/vuln/detail/CVE-2018-7540\n[ 18 ] CVE-2018-7541\n https://nvd.nist.gov/vuln/detail/CVE-2018-7541\n[ 19 ] CVE-2018-7542\n https://nvd.nist.gov/vuln/detail/CVE-2018-7542\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201810-06\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\[email protected] or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2018 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2018-3646" }, { "db": "CERT/CC", "id": "VU#982149" }, { "db": "VULHUB", "id": "VHN-133677" }, { "db": "VULMON", "id": "CVE-2018-3646" }, { "db": "PACKETSTORM", "id": "148941" }, { "db": "PACKETSTORM", "id": "149010" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "148904" }, { "db": "PACKETSTORM", "id": "149143" }, { "db": "PACKETSTORM", "id": "148902" }, { "db": "PACKETSTORM", "id": "148905" }, { "db": "PACKETSTORM", "id": "148946" }, { "db": "PACKETSTORM", "id": "150083" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3646", "trust": 2.1 }, { "db": "CERT/CC", "id": "VU#982149", "trust": 2.0 }, { "db": "SIEMENS", "id": "SSA-608355", "trust": 1.2 }, { "db": "SIEMENS", "id": "SSA-254686", "trust": 1.2 }, { "db": "SECTRACK", "id": "1041451", "trust": 1.2 }, { "db": "SECTRACK", "id": "1042004", "trust": 1.2 }, { "db": "BID", "id": "105080", "trust": 1.2 }, { "db": "LENOVO", "id": "LEN-24163", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "148991", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148896", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-133677", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-3646", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148941", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149010", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150116", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148904", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149143", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148902", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148905", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148946", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150083", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#982149" }, { "db": "VULHUB", "id": "VHN-133677" }, { "db": "VULMON", "id": "CVE-2018-3646" }, { "db": "PACKETSTORM", "id": "148941" }, { "db": "PACKETSTORM", "id": "149010" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "148904" }, { "db": "PACKETSTORM", "id": "149143" }, { "db": "PACKETSTORM", "id": "148902" }, { "db": "PACKETSTORM", "id": "148905" }, { "db": "PACKETSTORM", "id": "148946" }, { "db": "PACKETSTORM", "id": "150083" }, { "db": "NVD", "id": "CVE-2018-3646" } ] }, "id": "VAR-201808-0957", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-133677" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T19:59:24.364000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/08/15/foreshadow_sgx_software_attestations_collateral_damage/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/08/14/intel_l1_terminal_fault_bugs/" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182387 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182388 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182389 - Security Advisory" }, { "title": "Red Hat: Important: rhev-hypervisor7 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182404 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182391 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182603 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182602 - Security Advisory" }, { "title": "Red Hat: Important: rhvm-appliance security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182402 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182392 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182396 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182393 - Security Advisory" }, { "title": "Red Hat: Important: redhat-virtualization-host security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182403 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182394 - Security Advisory" }, { "title": "Debian Security Advisories: DSA-4274-1 xen -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=2129055bb51ebf11b86d56acef7f5da1" }, { "title": "Debian Security Advisories: DSA-4279-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=dac4eea76febd76490afc049b9aa11cb" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182384 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3823-1" }, { "title": "Red Hat: Important: kernel-rt security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182395 - Security Advisory" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2018-3646" }, { "title": "Red Hat: CVE-2018-3646", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2018-3646" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182390 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3740-1" }, { "title": "Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3740-2" }, { "title": "Ubuntu Security Notice: intel-microcode vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3756-1" }, { "title": "Ubuntu Security Notice: linux regressions", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3741-3" }, { "title": "Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3741-2" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3741-1" }, { "title": "Amazon Linux AMI: ALAS-2018-1058", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2018-1058" }, { "title": "Ubuntu Security Notice: linux-lts-trusty vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3742-2" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3742-1" }, { "title": "Ubuntu Security Notice: linux-lts-trusty regressions", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3742-3" }, { "title": "Amazon Linux 2: ALAS2-2018-1058", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2018-1058" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=831545c255e00dbde24c93b2cf2135d6" }, { "title": "IBM: IBM Security Bulletin: Multiple Foreshadow Spectre Variant vulnerabilities affect IBM OS Image for Red Hat Linux Systems in IBM PureApplication System (CVE-2018-3615 CVE-2018-3620 CVE-2018-3646)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=f295531b3aa99d37dbc53693639947d9" }, { "title": "HP: HPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03590" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=ba953f0879f87a755234bc0818c99c6d" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=deca5f6210b098f58ce384c28747b82c" }, { "title": "Huawei Security Advisories: Security Advisory - CPU Side Channel Vulnerability \"L1TF\"", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=28eb43a14c12e8c070afa60d55f86b55" }, { "title": "Cisco: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20180814-cpusidechannel" }, { "title": "Forcepoint Security Advisories: Meltdown and Spectre Vulnerability CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2018-3640, CVE-2018-3639, CVE-2018-3615, CVE-2018-3620, CVE-2018-3646", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories\u0026qid=459877525c31ac6029f4be4a6ea97e17" }, { "title": "Citrix Security Bulletins: XenServer Multiple Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=89d06253986d1cdae0f8d9ffbff97d18" }, { "title": "IBM: Potential Impact on Processors in the POWER Family", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=cf9e1e42799edbda36ec7415288ad7f0" }, { "title": "IBM: IBM Security Bulletin: IBM Security Guardium is affected by Red Hat kernel vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=75b9d198a73a91d81765c8b428423224" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=621cdbb127d953e0d9d06eff7dd10106" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=204a1aa9ebf7b5f47151e8b011269862" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2019", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=f655264a6935505d167bbf45f409a57b" }, { "title": "Palo Alto Networks Security Advisory: PAN-SA-2018-0011 Information about L1 Terminal Fault findings", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory\u0026qid=74b853f8cd89b12964ff841924244a71" }, { "title": "Fortinet Security Advisories: Meltdown and Spectre class vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-18-002" }, { "title": "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins\u0026qid=05b5bbd6fb289370b459faf1f4e3919d" }, { "title": "IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=55ea315dfb69fce8383762ac64250315" }, { "title": "IBM: IBM Security Bulletin: IBM API Connect has addressed multiple vulnerabilities in Developer Portal\u2019s dependencies \u2013 Cumulative list from June 28, 2018 to December 13, 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=43da2cd72c1e378d8d94ecec029fcc61" }, { "title": "vmware-esxi-67", "trust": 0.1, "url": "https://github.com/casagency/vmware-esxi-67 " }, { "title": "711552870_s", "trust": 0.1, "url": "https://github.com/Qwhqfmmx/711552870_s " }, { "title": "", "trust": 0.1, "url": "https://github.com/teusink/Home-Security-by-OS-Hardening " }, { "title": "Network_research_report", "trust": 0.1, "url": "https://github.com/dongminkim0220/Network_research_report " }, { "title": "Home-Security-by-W10-Hardening", "trust": 0.1, "url": "https://github.com/teusink/Home-Security-by-W10-Hardening " }, { "title": "l1tf-poc", "trust": 0.1, "url": "https://github.com/gregvish/l1tf-poc " }, { "title": "arch_linux_installation_guide", "trust": 0.1, "url": "https://github.com/kyberdrb/arch_linux_installation_guide " }, { "title": "711552870_s", "trust": 0.1, "url": "https://github.com/yoobao55/711552870_s " }, { "title": "l1tf-demo", "trust": 0.1, "url": "https://github.com/blitz/l1tf-demo " }, { "title": "lx-port-data", "trust": 0.1, "url": "https://github.com/omniosorg/lx-port-data " }, { "title": "win10-regtweak", "trust": 0.1, "url": "https://github.com/interlunar/win10-regtweak " }, { "title": "cpu-report", "trust": 0.1, "url": "https://github.com/rosenbergj/cpu-report " }, { "title": "specter---meltdown--checker", "trust": 0.1, "url": "https://github.com/vurtne/specter---meltdown--checker " }, { "title": "TEApot", "trust": 0.1, "url": "https://github.com/github-3rr0r/TEApot " }, { "title": "TEApot", "trust": 0.1, "url": "https://github.com/Mashiro1995/TEApot " }, { "title": "", "trust": 0.1, "url": "https://github.com/kali973/spectre-meltdown-checker " }, { "title": "puppet-meltdown", "trust": 0.1, "url": "https://github.com/timidri/puppet-meltdown " }, { "title": "cSpeculationControlFixes", "trust": 0.1, "url": "https://github.com/poshsecurity/cSpeculationControlFixes " }, { "title": "", "trust": 0.1, "url": "https://github.com/es0j/hyperbleed " }, { "title": "Linux-Tools", "trust": 0.1, "url": "https://github.com/minutesinch/Linux-Tools " }, { "title": "spectre-meltdown", "trust": 0.1, "url": "https://github.com/edsonjt81/spectre-meltdown " }, { "title": "spectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/speed47/spectre-meltdown-checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/merlinepedra25/spectre-meltdown-checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/merlinepedra/spectre-meltdown-checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/kin-cho/my-spectre-meltdown-checker " }, { "title": "Hardware-and-Firmware-Security-Guidance", "trust": 0.1, "url": "https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance " }, { "title": "Firmware-Security", "trust": 0.1, "url": "https://github.com/virusbeeE/Firmware-Security " }, { "title": "hardware-attacks-state-of-the-art", "trust": 0.1, "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art " }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/microsoft-rolls-out-new-intel-microcode-for-windows-10-server-2016/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-3646" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133677" }, { "db": "NVD", "id": "CVE-2018-3646" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "trust": 2.0, "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "trust": 2.0, "url": "https://foreshadowattack.eu/" }, { "trust": 1.4, "url": "https://access.redhat.com/errata/rhsa-2018:2387" }, { "trust": 1.3, "url": "https://www.kb.cert.org/vuls/id/982149" }, { "trust": 1.3, "url": "https://security.gentoo.org/glsa/201810-06" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2392" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2394" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2403" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2404" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2018:2603" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/105080" }, { "trust": 1.2, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180814-cpusidechannel" }, { "trust": 1.2, "url": "http://support.lenovo.com/us/en/solutions/len-24163" }, { "trust": 1.2, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "trust": 1.2, "url": "http://www.vmware.com/security/advisories/vmsa-2018-0020.html" }, { "trust": 1.2, "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "trust": 1.2, "url": "https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0" }, { "trust": 1.2, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180018" }, { "trust": 1.2, "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0010" }, { "trust": 1.2, "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "trust": 1.2, "url": "https://support.f5.com/csp/article/k31300402" }, { "trust": 1.2, "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "trust": 1.2, "url": "https://www.synology.com/support/security/synology_sa_18_45" }, { "trust": 1.2, "url": "https://www.debian.org/security/2018/dsa-4274" }, { "trust": 1.2, "url": "https://www.debian.org/security/2018/dsa-4279" }, { "trust": 1.2, "url": "https://security.freebsd.org/advisories/freebsd-sa-18:09.l1tf.asc" }, { "trust": 1.2, "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "trust": 1.2, "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2384" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2388" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2389" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2390" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2391" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2393" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2395" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2396" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2402" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2602" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1041451" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1042004" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3740-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3740-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3741-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3741-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3742-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3742-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3756-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3823-1/" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03874en_us" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/xrfkqwyv2h4bv75cungcge5tnvqclbgz/" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/v4uwgorqwcencif2bhwuef2odbv75qs2/" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3646" }, { "trust": 0.8, "url": "https://www.usenix.org/conference/usenixsecurity18/presentation/bulck" }, { "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html" }, { "trust": 0.8, "url": "https://www.intel.com/content/dam/www/public/us/en/documents/sa00115-microcode-update-guidance.pdf" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3620" }, { "trust": 0.6, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2018-3646" }, { "trust": 0.6, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2018-3620" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://access.redhat.com/security/vulnerabilities/l1tf" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3639" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/2974891" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10901" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-10901" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-3639" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03874en_us" }, { "trust": 0.1, "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/xrfkqwyv2h4bv75cungcge5tnvqclbgz/" }, { "trust": 0.1, "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/v4uwgorqwcencif2bhwuef2odbv75qs2/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/casagency/vmware-esxi-67" }, { "trust": 0.1, "url": "https://github.com/teusink/home-security-by-w10-hardening" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-5390" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5390" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/linux" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12618" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4203" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4336" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4338" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4308" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4332" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4326" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4153" }, { "trust": 0.1, "url": "https://support.apple.com/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4340" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4304" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4126" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4324" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4331" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4310" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1777" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4341" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3194" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4321" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4337" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12613" }, { "trust": 0.1, "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5244" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7542" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12892" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10471" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12891" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5753" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12893" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10982" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15469" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10472" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5754" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10981" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5715" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15468" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15470" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7541" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7540" } ], "sources": [ { "db": "CERT/CC", "id": "VU#982149" }, { "db": "VULHUB", "id": "VHN-133677" }, { "db": "VULMON", "id": "CVE-2018-3646" }, { "db": "PACKETSTORM", "id": "148941" }, { "db": "PACKETSTORM", "id": "149010" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "148904" }, { "db": "PACKETSTORM", "id": "149143" }, { "db": "PACKETSTORM", "id": "148902" }, { "db": "PACKETSTORM", "id": "148905" }, { "db": "PACKETSTORM", "id": "148946" }, { "db": "PACKETSTORM", "id": "150083" }, { "db": "NVD", "id": "CVE-2018-3646" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#982149" }, { "db": "VULHUB", "id": "VHN-133677" }, { "db": "VULMON", "id": "CVE-2018-3646" }, { "db": "PACKETSTORM", "id": "148941" }, { "db": "PACKETSTORM", "id": "149010" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "148904" }, { "db": "PACKETSTORM", "id": "149143" }, { "db": "PACKETSTORM", "id": "148902" }, { "db": "PACKETSTORM", "id": "148905" }, { "db": "PACKETSTORM", "id": "148946" }, { "db": "PACKETSTORM", "id": "150083" }, { "db": "NVD", "id": "CVE-2018-3646" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-15T00:00:00", "db": "CERT/CC", "id": "VU#982149" }, { "date": "2018-08-14T00:00:00", "db": "VULHUB", "id": "VHN-133677" }, { "date": "2018-08-14T00:00:00", "db": "VULMON", "id": "CVE-2018-3646" }, { "date": "2018-08-15T17:16:28", "db": "PACKETSTORM", "id": "148941" }, { "date": "2018-08-20T17:06:29", "db": "PACKETSTORM", "id": "149010" }, { "date": "2018-10-31T16:10:50", "db": "PACKETSTORM", "id": "150116" }, { "date": "2018-08-15T04:39:10", "db": "PACKETSTORM", "id": "148904" }, { "date": "2018-08-29T20:32:22", "db": "PACKETSTORM", "id": "149143" }, { "date": "2018-08-15T04:38:57", "db": "PACKETSTORM", "id": "148902" }, { "date": "2018-08-15T04:39:57", "db": "PACKETSTORM", "id": "148905" }, { "date": "2018-08-15T17:17:34", "db": "PACKETSTORM", "id": "148946" }, { "date": "2018-10-31T01:14:40", "db": "PACKETSTORM", "id": "150083" }, { "date": "2018-08-14T19:29:00.920000", "db": "NVD", "id": "CVE-2018-3646" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-10T00:00:00", "db": "CERT/CC", "id": "VU#982149" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-133677" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2018-3646" }, { "date": "2024-11-21T04:05:50.020000", "db": "NVD", "id": "CVE-2018-3646" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)", "sources": [ { "db": "CERT/CC", "id": "VU#982149" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "bypass", "sources": [ { "db": "PACKETSTORM", "id": "148902" }, { "db": "PACKETSTORM", "id": "148905" } ], "trust": 0.2 } }
var-201906-1236
Vulnerability from variot
Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1236", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11129" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-554" } ], "trust": 0.6 }, "cve": "CVE-2019-11129", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11129", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142744", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-11129", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-11129", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-554", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142744", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11129", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142744" }, { "db": "VULMON", "id": "CVE-2019-11129" }, { "db": "CNNVD", "id": "CNNVD-201906-554" }, { "db": "NVD", "id": "CVE-2019-11129" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc", "sources": [ { "db": "NVD", "id": "CVE-2019-11129" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142744" }, { "db": "VULMON", "id": "CVE-2019-11129" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11129", "trust": 2.9 }, { "db": "BID", "id": "108766", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-554", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142744", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11129", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142744" }, { "db": "VULMON", "id": "CVE-2019-11129" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-554" }, { "db": "NVD", "id": "CVE-2019-11129" } ] }, "id": "VAR-201906-1236", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142744" } ], "trust": 0.8407131071428573 }, "last_update_date": "2024-11-23T20:02:19.110000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel NUC Kit Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93787" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11129" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142744" }, { "db": "NVD", "id": "CVE-2019-11129" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142744" }, { "db": "VULMON", "id": "CVE-2019-11129" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-554" }, { "db": "NVD", "id": "CVE-2019-11129" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142744" }, { "db": "VULMON", "id": "CVE-2019-11129" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-554" }, { "db": "NVD", "id": "CVE-2019-11129" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142744" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11129" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-554" }, { "date": "2019-06-13T16:29:01.577000", "db": "NVD", "id": "CVE-2019-11129" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-20T00:00:00", "db": "VULHUB", "id": "VHN-142744" }, { "date": "2019-06-20T00:00:00", "db": "VULMON", "id": "CVE-2019-11129" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-554" }, { "date": "2024-11-21T04:20:35.123000", "db": "NVD", "id": "CVE-2019-11129" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-554" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-554" } ], "trust": 0.6 } }
var-201906-0916
Vulnerability from variot
Reflected XSS in web interface for Intel(R) Accelerated Storage Manager in Intel(R) RSTe before version 5.5.0.2015 may allow an unauthenticated user to potentially enable denial of service via network access. Intel Rapid Storage Technology Enterprise is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to perform unauthorized actions such as reading, modifying, or deleting content, inject malicious content or cause denial-of-service conditions. Intel Rapid Storage Technology Enterprise version prior 5.5.0.2015 to are vulnerable. Intel Accelerated Storage Manager is one of the accelerated storage managers. An attacker could exploit this vulnerability to cause a denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0916", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rapid storage technology enterprise", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "5.5.0.2015" }, { "model": "thinkstation p720", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "thinkstation p520", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "thinkstation p520c", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "thinkstation p920", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "rapid storage technology enterprise", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "5.5.0.2013" }, { "model": "rapid storage technology enterprise", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "5.5.0.2015" } ], "sources": [ { "db": "BID", "id": "108775" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0130" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marius Gabriel Mihai.", "sources": [ { "db": "BID", "id": "108775" }, { "db": "CNNVD", "id": "CNNVD-201906-529" } ], "trust": 0.9 }, "cve": "CVE-2019-0130", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2019-0130", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-140161", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2019-0130", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0130", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-529", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-140161", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140161" }, { "db": "CNNVD", "id": "CNNVD-201906-529" }, { "db": "NVD", "id": "CVE-2019-0130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reflected XSS in web interface for Intel(R) Accelerated Storage Manager in Intel(R) RSTe before version 5.5.0.2015 may allow an unauthenticated user to potentially enable denial of service via network access. Intel Rapid Storage Technology Enterprise is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to perform unauthorized actions such as reading, modifying, or deleting content, inject malicious content or cause denial-of-service conditions. \nIntel Rapid Storage Technology Enterprise version prior 5.5.0.2015 to are vulnerable. Intel Accelerated Storage Manager is one of the accelerated storage managers. An attacker could exploit this vulnerability to cause a denial of service", "sources": [ { "db": "NVD", "id": "CVE-2019-0130" }, { "db": "BID", "id": "108775" }, { "db": "VULHUB", "id": "VHN-140161" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0130", "trust": 2.8 }, { "db": "BID", "id": "108775", "trust": 2.0 }, { "db": "LENOVO", "id": "LEN-27843", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-529", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140161", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140161" }, { "db": "BID", "id": "108775" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-529" }, { "db": "NVD", "id": "CVE-2019-0130" } ] }, "id": "VAR-201906-0916", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140161" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T20:02:16.889000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel Rapid Storage Technology Enterprise Intel Accelerated Storage Manager Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93760" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-529" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140161" }, { "db": "NVD", "id": "CVE-2019-0130" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/108775" }, { "trust": 2.0, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "trust": 1.7, "url": "https://support.lenovo.com/us/en/product_security/len-27843" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.9, "url": "http://www.intel.com/content/www/us/en/homepage.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/zh/product_security/len-27843" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140161" }, { "db": "BID", "id": "108775" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-529" }, { "db": "NVD", "id": "CVE-2019-0130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140161" }, { "db": "BID", "id": "108775" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-529" }, { "db": "NVD", "id": "CVE-2019-0130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140161" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108775" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-529" }, { "date": "2019-06-13T16:29:00.403000", "db": "NVD", "id": "CVE-2019-0130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-02T00:00:00", "db": "VULHUB", "id": "VHN-140161" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108775" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-07-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-529" }, { "date": "2024-11-21T04:16:17.970000", "db": "NVD", "id": "CVE-2019-0130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-529" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-529" } ], "trust": 0.6 } }
var-201906-0915
Vulnerability from variot
Improper permissions in the installer for Intel(R) Chipset Device Software (INF Update Utility) before version 10.1.1.45 may allow an authenticated user to escalate privilege via local access. Intel Chipset Device Software is prone to a local privilege-escalation vulnerability. A local attacker can exploit this issue to gain elevated privileges. Intel Chipset Device Software prior to version 10.1.1.45 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0915", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "chipset device software", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "10.1.1.45" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.0.13" }, { "model": "chipset device software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.1.1.44" }, { "model": "chipset device software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.1.1.42" }, { "model": "chipset device software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.1.1.35" }, { "model": "chipset device software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.1.1.32" }, { "model": "chipset device software", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "10.1.1.45" } ], "sources": [ { "db": "BID", "id": "108767" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0128" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marius Gabriel Mihai", "sources": [ { "db": "BID", "id": "108767" }, { "db": "CNNVD", "id": "CNNVD-201906-526" } ], "trust": 0.9 }, "cve": "CVE-2019-0128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-0128", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140159", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-0128", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0128", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-526", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-140159", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140159" }, { "db": "CNNVD", "id": "CNNVD-201906-526" }, { "db": "NVD", "id": "CVE-2019-0128" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permissions in the installer for Intel(R) Chipset Device Software (INF Update Utility) before version 10.1.1.45 may allow an authenticated user to escalate privilege via local access. Intel Chipset Device Software is prone to a local privilege-escalation vulnerability. \nA local attacker can exploit this issue to gain elevated privileges. \nIntel Chipset Device Software prior to version 10.1.1.45 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2019-0128" }, { "db": "BID", "id": "108767" }, { "db": "VULHUB", "id": "VHN-140159" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0128", "trust": 2.8 }, { "db": "BID", "id": "108767", "trust": 2.0 }, { "db": "LENOVO", "id": "LEN-27840", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-526", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140159", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140159" }, { "db": "BID", "id": "108767" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-526" }, { "db": "NVD", "id": "CVE-2019-0128" } ] }, "id": "VAR-201906-0915", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140159" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T20:34:14.663000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel Chipset Device Software Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93758" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-526" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140159" }, { "db": "NVD", "id": "CVE-2019-0128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/108767" }, { "trust": 2.0, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "trust": 1.7, "url": "https://support.lenovo.com/us/en/product_security/len-27840" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/zh/product_security/len-27840" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140159" }, { "db": "BID", "id": "108767" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-526" }, { "db": "NVD", "id": "CVE-2019-0128" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140159" }, { "db": "BID", "id": "108767" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-526" }, { "db": "NVD", "id": "CVE-2019-0128" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140159" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108767" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-526" }, { "date": "2019-06-13T16:29:00.357000", "db": "NVD", "id": "CVE-2019-0128" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-03T00:00:00", "db": "VULHUB", "id": "VHN-140159" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108767" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-526" }, { "date": "2024-11-21T04:16:17.667000", "db": "NVD", "id": "CVE-2019-0128" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108767" }, { "db": "CNNVD", "id": "CNNVD-201906-526" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-526" } ], "trust": 0.6 } }
var-201906-0953
Vulnerability from variot
Improper permissions in the installer for the ITE Tech* Consumer Infrared Driver for Windows 10 versions before 5.4.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access. A local attacker can exploit this issue to gain elevated privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0953", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ite tech consumer infrared driver", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "5.4.3.0" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "ite tech consumer infrared driver for windows", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "105.2.2" }, { "model": "ite tech consumer infrared driver for windows", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "105.4.2.0" }, { "model": "ite tech consumer infrared driver for windows", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "105.4.1.0" }, { "model": "ite tech consumer infrared driver for windows", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "105.3.2.0" }, { "model": "ite tech consumer infrared driver for windows", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "105.1.0.7" }, { "model": "ite tech consumer infrared driver for windows", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "105.4.3.0" } ], "sources": [ { "db": "BID", "id": "108782" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2018-3702" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SaifAllah benMassaoud", "sources": [ { "db": "BID", "id": "108782" }, { "db": "CNNVD", "id": "CNNVD-201906-564" } ], "trust": 0.9 }, "cve": "CVE-2018-3702", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-3702", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-3702", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2018-3702", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-564", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-564" }, { "db": "NVD", "id": "CVE-2018-3702" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permissions in the installer for the ITE Tech* Consumer Infrared Driver for Windows 10 versions before 5.4.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access. \nA local attacker can exploit this issue to gain elevated privileges", "sources": [ { "db": "NVD", "id": "CVE-2018-3702" }, { "db": "BID", "id": "108782" } ], "trust": 1.17 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3702", "trust": 2.7 }, { "db": "BID", "id": "108782", "trust": 1.9 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-564", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "108782" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-564" }, { "db": "NVD", "id": "CVE-2018-3702" } ] }, "id": "VAR-201906-0953", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25292397 }, "last_update_date": "2024-11-23T20:50:56.460000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel ITE Tech* Consumer Infrared Driver Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93795" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-564" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-732", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2018-3702" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/108782" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "BID", "id": "108782" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-564" }, { "db": "NVD", "id": "CVE-2018-3702" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "108782" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-564" }, { "db": "NVD", "id": "CVE-2018-3702" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108782" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-564" }, { "date": "2019-06-13T16:29:00.310000", "db": "NVD", "id": "CVE-2018-3702" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108782" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-564" }, { "date": "2024-11-21T04:05:55.007000", "db": "NVD", "id": "CVE-2018-3702" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108782" }, { "db": "CNNVD", "id": "CNNVD-201906-564" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-564" } ], "trust": 0.6 } }
var-201906-1234
Vulnerability from variot
Buffer overflow in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1234", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11127" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-552" } ], "trust": 0.6 }, "cve": "CVE-2019-11127", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11127", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142742", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-11127", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-11127", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-552", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142742", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11127", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142742" }, { "db": "VULMON", "id": "CVE-2019-11127" }, { "db": "CNNVD", "id": "CNNVD-201906-552" }, { "db": "NVD", "id": "CVE-2019-11127" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc", "sources": [ { "db": "NVD", "id": "CVE-2019-11127" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142742" }, { "db": "VULMON", "id": "CVE-2019-11127" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11127", "trust": 2.9 }, { "db": "BID", "id": "108766", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-552", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142742", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11127", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142742" }, { "db": "VULMON", "id": "CVE-2019-11127" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-552" }, { "db": "NVD", "id": "CVE-2019-11127" } ] }, "id": "VAR-201906-1234", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142742" } ], "trust": 0.8407131071428573 }, "last_update_date": "2024-11-23T20:02:18.405000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel NUC Kit Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93785" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11127" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-552" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142742" }, { "db": "NVD", "id": "CVE-2019-11127" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142742" }, { "db": "VULMON", "id": "CVE-2019-11127" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-552" }, { "db": "NVD", "id": "CVE-2019-11127" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142742" }, { "db": "VULMON", "id": "CVE-2019-11127" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-552" }, { "db": "NVD", "id": "CVE-2019-11127" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142742" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11127" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-552" }, { "date": "2019-06-13T16:29:01.497000", "db": "NVD", "id": "CVE-2019-11127" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142742" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11127" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-552" }, { "date": "2024-11-21T04:20:34.887000", "db": "NVD", "id": "CVE-2019-11127" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-552" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-552" } ], "trust": 0.6 } }
var-201906-0913
Vulnerability from variot
Insufficient input validation in the Intel(R) SGX driver for Linux may allow an authenticated user to potentially enable a denial of service via local access. Intel SGX Driver for Linux is prone to a local denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition. The following products are affected: Intel SGX Linux client driver prior to 2.5 Intel SGX DCAP Linux driver prior to 1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0913", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "software guard extensions data center attestation primitives", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "1.1" }, { "model": "software guard extensions", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "2.5" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "software guard extensions linux", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "2.4" }, { "model": "software guard extensions dcap linux", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "1.0" }, { "model": "software guard extensions linux", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "2.5" }, { "model": "software guard extensions dcap linux", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "1.1" } ], "sources": [ { "db": "BID", "id": "108771" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0157" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "108771" } ], "trust": 0.3 }, "cve": "CVE-2019-0157", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-0157", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2019-0157", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0157", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-565", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-565" }, { "db": "NVD", "id": "CVE-2019-0157" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient input validation in the Intel(R) SGX driver for Linux may allow an authenticated user to potentially enable a denial of service via local access. Intel SGX Driver for Linux is prone to a local denial-of-service vulnerability. \nAttackers can exploit this issue to cause a denial-of-service condition. \nThe following products are affected:\nIntel SGX Linux client driver prior to 2.5\nIntel SGX DCAP Linux driver prior to 1.1", "sources": [ { "db": "NVD", "id": "CVE-2019-0157" }, { "db": "BID", "id": "108771" } ], "trust": 1.17 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0157", "trust": 2.7 }, { "db": "BID", "id": "108771", "trust": 1.9 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-565", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "108771" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-565" }, { "db": "NVD", "id": "CVE-2019-0157" } ] }, "id": "VAR-201906-0913", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25292397 }, "last_update_date": "2024-11-23T21:29:39.357000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel SGX Driver input verification error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93796" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-565" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0157" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/108771" }, { "trust": 1.6, "url": "https://support.f5.com/csp/article/k10244523" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 1.0, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.9, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html?wapkw=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" } ], "sources": [ { "db": "BID", "id": "108771" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-565" }, { "db": "NVD", "id": "CVE-2019-0157" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "108771" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-565" }, { "db": "NVD", "id": "CVE-2019-0157" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108771" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-565" }, { "date": "2019-06-13T16:29:00.810000", "db": "NVD", "id": "CVE-2019-0157" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108771" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-565" }, { "date": "2024-11-21T04:16:22.333000", "db": "NVD", "id": "CVE-2019-0157" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108771" }, { "db": "CNNVD", "id": "CNNVD-201906-565" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "108771" }, { "db": "CNNVD", "id": "CNNVD-201906-565" } ], "trust": 0.9 } }
var-201801-1712
Vulnerability from variot
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \"melts\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \"cross-border\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Xeon CPU E5-1650 v3, v2, v4; Xeon E3-1265l v2, v3, v4 ; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc.
CVE-2017-17975
Tuba Yavuz reported a use-after-free flaw in the USBTV007
audio-video grabber driver.
CVE-2017-18218
Jun He reported a user-after-free flaw in the Hisilicon HNS ethernet
driver.
CVE-2017-18222
It was reported that the Hisilicon Network Subsystem (HNS) driver
implementation does not properly handle ethtool private flags.
CVE-2017-18257
It was reported that the f2fs implementation is prone to an infinite
loop caused by an integer overflow in the __get_data_block()
function.
CVE-2018-1065
The syzkaller tool found a NULL pointer dereference flaw in the
netfilter subsystem when handling certain malformed iptables
rulesets.
CVE-2018-1108
Jann Horn reported that crng_ready() does not properly handle the
crng_init variable states and the RNG could be treated as
cryptographically safe too early after system boot.
CVE-2018-7480
Hou Tao discovered a double-free flaw in the blkcg_init_queue()
function in block/blk-cgroup.c. Relevant releases/architectures:
RHEL 7-based RHEV-H - noarch
- These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2018-1-8-3 Safari 11.0.2
Safari 11.0.2 is now available and and addresses the following:
Available for: OS X El Capitan 10.11.6 and macOS Sierra 10.12.6 Description: Safari 11.0.2 includes security improvements to mitigate the effects of Spectre (CVE- 2017-5753 and CVE-2017-5715).
We would like to acknowledge Jann Horn of Google Project Zero; and Paul Kocher in collaboration with Daniel Genkin of University of Pennsylvania and University of Maryland, Daniel Gruss of Graz University of Technology, Werner Haas of Cyberus Technology, Mike Hamburg of Rambus (Cryptography Research Division), Moritz Lipp of Graz University of Technology, Stefan Mangard of Graz University of Technology, Thomas Prescher of Cyberus Technology, Michael Schwarz of Graz University of Technology, and Yuval Yarom of University of Adelaide and Data61 for their assistance.
Installation note:
Safari 11.0.2 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-4187-1 [email protected] https://www.debian.org/security/ Ben Hutchings May 01, 2018 https://www.debian.org/security/faq
Package : linux CVE ID : CVE-2015-9016 CVE-2017-0861 CVE-2017-5715 CVE-2017-5753 CVE-2017-13166 CVE-2017-13220 CVE-2017-16526 CVE-2017-16911 CVE-2017-16912 CVE-2017-16913 CVE-2017-16914 CVE-2017-18017 CVE-2017-18203 CVE-2017-18216 CVE-2017-18232 CVE-2017-18241 CVE-2018-1066 CVE-2018-1068 CVE-2018-1092 CVE-2018-5332 CVE-2018-5333 CVE-2018-5750 CVE-2018-5803 CVE-2018-6927 CVE-2018-7492 CVE-2018-7566 CVE-2018-7740 CVE-2018-7757 CVE-2018-7995 CVE-2018-8781 CVE-2018-8822 CVE-2018-1000004 CVE-2018-1000199
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
CVE-2015-9016
Ming Lei reported a race condition in the multiqueue block layer
(blk-mq). On a system with a driver using blk-mq (mtip32xx,
null_blk, or virtio_blk), a local user might be able to use this
for denial of service or possibly for privilege escalation.
CVE-2017-0861
Robb Glasser reported a potential use-after-free in the ALSA (sound)
PCM core. We believe this was not possible in practice.
CVE-2017-5715
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 2 (branch
target injection) and is mitigated for the x86 architecture (amd64
and i386) by using the "retpoline" compiler feature which allows
indirect branches to be isolated from speculative execution.
CVE-2017-5753
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 1
(bounds-check bypass) and is mitigated by identifying vulnerable
code sections (array bounds checking followed by array access) and
replacing the array access with the speculation-safe
array_index_nospec() function.
More use sites will be added over time.
CVE-2017-13166
A bug in the 32-bit compatibility layer of the v4l2 ioctl handling
code has been found. Memory protections ensuring user-provided
buffers always point to userland memory were disabled, allowing
destination addresses to be in kernel space. On a 64-bit kernel a
local user with access to a suitable video device can exploit this
to overwrite kernel memory, leading to privilege escalation.
CVE-2017-13220
Al Viro reported that the Bluetooth HIDP implementation could
dereference a pointer before performing the necessary type check.
A local user could use this to cause a denial of service.
CVE-2017-16526
Andrey Konovalov reported that the UWB subsystem may dereference
an invalid pointer in an error case. A local user might be able
to use this for denial of service.
CVE-2017-16911
Secunia Research reported that the USB/IP vhci_hcd driver exposed
kernel heap addresses to local users. This information could aid the
exploitation of other vulnerabilities.
CVE-2017-16912
Secunia Research reported that the USB/IP stub driver failed to
perform a range check on a received packet header field, leading
to an out-of-bounds read. A remote user able to connect to the
USB/IP server could use this for denial of service.
CVE-2017-16913
Secunia Research reported that the USB/IP stub driver failed to
perform a range check on a received packet header field, leading
to excessive memory allocation. A remote user able to connect to
the USB/IP server could use this for denial of service.
CVE-2017-16914
Secunia Research reported that the USB/IP stub driver failed to
check for an invalid combination of fields in a received packet,
leading to a null pointer dereference. A remote user able to
connect to the USB/IP server could use this for denial of service.
CVE-2017-18017
Denys Fedoryshchenko reported that the netfilter xt_TCPMSS module
failed to validate TCP header lengths, potentially leading to a
use-after-free. If this module is loaded, it could be used by a
remote attacker for denial of service or possibly for code
execution.
CVE-2017-18203
Hou Tao reported that there was a race condition in creation and
deletion of device-mapper (DM) devices. A local user could
potentially use this for denial of service.
CVE-2017-18216
Alex Chen reported that the OCFS2 filesystem failed to hold a
necessary lock during nodemanager sysfs file operations,
potentially leading to a null pointer dereference. A local user
could use this for denial of service.
CVE-2017-18232
Jason Yan reported a race condition in the SAS (Serial-Attached
SCSI) subsystem, between probing and destroying a port. This
could lead to a deadlock. A physically present attacker could
use this to cause a denial of service.
CVE-2017-18241
Yunlei He reported that the f2fs implementation does not properly
initialise its state if the "noflush_merge" mount option is used.
A local user with access to a filesystem mounted with this option
could use this to cause a denial of service.
CVE-2018-1066
Dan Aloni reported to Red Hat that the CIFS client implementation
would dereference a null pointer if the server sent an invalid
response during NTLMSSP setup negotiation. This could be used
by a malicious server for denial of service.
CVE-2018-1068
The syzkaller tool found that the 32-bit compatibility layer of
ebtables did not sufficiently validate offset values. On a 64-bit
kernel, a local user with the CAP_NET_ADMIN capability (in any user
namespace) could use this to overwrite kernel memory, possibly
leading to privilege escalation. Debian disables unprivileged user
namespaces by default.
CVE-2018-1092
Wen Xu reported that a crafted ext4 filesystem image would
trigger a null dereference when mounted. A local user able
to mount arbitrary filesystems could use this for denial of
service.
CVE-2018-5332
Mohamed Ghannam reported that the RDS protocol did not
sufficiently validate RDMA requests, leading to an out-of-bounds
write. A local attacker on a system with the rds module loaded
could use this for denial of service or possibly for privilege
escalation.
CVE-2018-5333
Mohamed Ghannam reported that the RDS protocol did not properly
handle an error case, leading to a null pointer dereference. A
local attacker on a system with the rds module loaded could
possibly use this for denial of service.
CVE-2018-5750
Wang Qize reported that the ACPI sbshc driver logged a kernel heap
address. This information could aid the exploitation of other
vulnerabilities.
CVE-2018-5803
Alexey Kodanev reported that the SCTP protocol did not range-check
the length of chunks to be created. A local or remote user could
use this to cause a denial of service.
CVE-2018-6927
Li Jinyue reported that the FUTEX_REQUEUE operation on futexes did
not check for negative parameter values, which might lead to a
denial of service or other security impact.
CVE-2018-7492
The syzkaller tool found that the RDS protocol was lacking a null
pointer check. A local attacker on a system with the rds module
loaded could use this for denial of service.
CVE-2018-7566
Fan LongFei reported a race condition in the ALSA (sound)
sequencer core, between write and ioctl operations. This could
lead to an out-of-bounds access or use-after-free. A local user
with access to a sequencer device could use this for denial of
service or possibly for privilege escalation.
CVE-2018-7740
Nic Losby reported that the hugetlbfs filesystem's mmap operation
did not properly range-check the file offset. A local user with
access to files on a hugetlbfs filesystem could use this to cause
a denial of service.
CVE-2018-7757
Jason Yan reported a memory leak in the SAS (Serial-Attached
SCSI) subsystem. A local user on a system with SAS devices
could use this to cause a denial of service.
CVE-2018-7995
Seunghun Han reported a race condition in the x86 MCE
(Machine Check Exception) driver. This is unlikely to have
any security impact.
CVE-2018-8781
Eyal Itkin reported that the udl (DisplayLink) driver's mmap
operation did not properly range-check the file offset. A local
user with access to a udl framebuffer device could exploit this to
overwrite kernel memory, leading to privilege escalation.
CVE-2018-8822
Dr Silvio Cesare of InfoSect reported that the ncpfs client
implementation did not validate reply lengths from the server. An
ncpfs server could use this to cause a denial of service or
remote code execution in the client.
CVE-2018-1000004
Luo Quan reported a race condition in the ALSA (sound) sequencer
core, between multiple ioctl operations. This could lead to a
deadlock or use-after-free. A local user with access to a
sequencer device could use this for denial of service or possibly
for privilege escalation.
CVE-2018-1000199
Andy Lutomirski discovered that the ptrace subsystem did not
sufficiently validate hardware breakpoint settings. Local users
can use this to cause a denial of service, or possibly for
privilege escalation, on x86 (amd64 and i386) and possibly other
architectures.
For the oldstable distribution (jessie), these problems have been fixed in version 3.16.56-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: [email protected] -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlron61fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Rtqw//Xf/L4bP65wU9M59Ef6xBt+Eph+yxeMsioGhu80ODdMemlmHzASMtfZjY AXxyt9l8lbHn8MmwDA4aLhhwHYXwvKATdpHSy1SILrRfb4s9P9uV1vsHaIeZ649E hDyNon9hP2tPso6BwqiYHZZy9Xxtd+T8vTBeBZwUKOLBkBRvV/gyNSUdJWp6L8WH aF4D1hHl9ZotDkyIvkubbx77aqbJ88I4R0n69x7L9udFbuXa+U7hV6dJdnpzyl/7 OukJfEtnkaUgWu0MdOfFss6iH5OQISn/y/ricRi29oKQiEp3YwnT5J9pFwSQeJJS H8ABVt251UoS0J+of3QWw0muOT/6UAF8SNpPKMJXC7Euq8pTmYVPSIeUYf4eqn65 UHZSCKXaszItq+uzVNYdkj504BJ4cG1lFxZtlrFWwKE8p7QOETN0GKvTRdu/SvDd Hl2nb4HouLpBYS518Th2/MGgzhXXAuO12MH3smenptZbqxKn9Z0XSTJYzFupgJk/ kKF2xkDFBE4toTLVE+6XdUKwYk4vkeDZyOGOwRYThSkKAzrUh5zThgal4HnknD2A 5ye4XLhjgSIT47/nmor6lhxd7WGXGkV33GF0azYlHr/sclfzxcU2Ev3NUBWQ8M3s CxfIO0FNCzO0WIUf40md7MlIAnDBIRGyYgNIIe7AnSRKKPykEx8= =wNQS -----END PGP SIGNATURE----- . Issue date: 2018-01-03 Updated on: 2018-01-09 CVE number: CVE-2017-5753, CVE-2017-5715
Notes:
Hypervisor mitigation can be classified into the two following categories: - Hypervisor-Specific remediation (documented in this advisory) - Hypervisor-Assisted Guest Remediation (documented in VMSA-2018-0004)
The ESXi patches and new versions of Workstation and Fusion of VMSA-2018-0004 include the Hypervisor-Specific remediation documented in this VMware Security Advisory.
More information on the types of remediation may be found in VMware Knowledge Base article 52245. Relevant Products
VMware vSphere ESXi (ESXi) VMware Workstation Pro / Player (Workstation) VMware Fusion Pro / Fusion (Fusion)
- Problem Description
Bounds Check bypass and Branch Target Injection issues
CPU data cache timing can be abused to efficiently leak information out of mis-speculated CPU execution, leading to (at worst) arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.
Result of exploitation may allow for information disclosure from one Virtual Machine to another Virtual Machine that is running on the same host. The remediation listed in the table below is for the known variants of the Bounds Check Bypass and Branch Target Injection issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2017-5753 (Bounds Check bypass) and CVE-2017-5715 (Branch Target Injection) to these issues.
Column 5 of the following table lists the action required to remediate the observed vulnerability in each release, if a solution is available.
VMware Product Running Replace with/ Mitigation Product Version on Severity Apply patch Workaround ========== ======= ======= ========= ============= ==========
ESXi 6.5 Any Important ESXi650-201712101-SG None ESXi 6.0 Any Important ESXi600-201711101-SG None ESXi 5.5 Any Important ESXi550-201801401-BG None
Workstation 14.x Any N/A Not affected N/A Workstation 12.x Any Important 12.5.8 None
Fusion 10.x OS X N/A Not affected N/A Fusion 8.x OS X Important 8.5.9 None
- Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware ESXi 6.5 Downloads: https://my.vmware.com/group/vmware/patch Documentation: http://kb.vmware.com/kb/2151099
VMware ESXi 6.0 Downloads: https://my.vmware.com/group/vmware/patch Documentation: http://kb.vmware.com/kb/2151132
VMware ESXi 5.5 Downloads: https://my.vmware.com/group/vmware/patch Documentation: http://kb.vmware.com/kb/52127
VMware Workstation Pro, Player 12.5.8 Downloads and Documentation: https://www.vmware.com/go/downloadworkstation https://www.vmware.com/support/pubs/ws_pubs.html
VMware Fusion Pro / Fusion 12.5.9 Downloads and Documentation: https://www.vmware.com/go/downloadfusion https://www.vmware.com/support/pubs/fusion_pubs.html
- Change log
2018-01-03 VMSA-2018-0002 Initial security advisory
2018-01-09 VMSA-2018-0002.1 Updated security advisor after release of ESXi 5.5 patch (ESXi550-201801401-BG) that has remediation against CVE-2017-5715 and CVE-2017-5753 on 2018-01-09. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
[email protected]
[email protected]
[email protected]
E-mail: [email protected] PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog https://blogs.vmware.com/security
Twitter https://twitter.com/VMwareSRC
Copyright 2018 VMware Inc. All rights reserved. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64
Security Fix(es):
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.
Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.
In this update initial mitigations for IBM Power (PowerPC) and IBM zSeries (S390) architectures are provided.
Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, S390)
Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important, PowerPC)
Red Hat would like to thank Google Project Zero for reporting these issues.
Bug Fix(es):
-
When attempting to reread parent blocks in btree traversal, the xfs code which deletes extended attributes from an inode assumed that the parent blocks were still on the cache. Under memory pressure and memory reclaim, such parent blocks were sometimes removed from the cache. Consequently, attempts to reread previously cached parent blocks caused the file system to read invalid memory. This update fixes xfs to reinitialize the pointer to the parent block buffers after the block has been reread. (BZ#1512811)
-
The write access check for huge pages did not function correctly on IBM z Systems. Consequently, if asynchronous I/O reads were used, buffers sometimes contained zeroes rather than data from a file, even when the io_getevents() system call reported that the associated read had finished successfully. This update fixes the write access check in the gup_huge_pmd() function in memory management, and read data is stored in asynchronous I/O buffers properly. (BZ#1513315)
-
With this update, the rule for iptables reloading has been optimized to complete faster. (BZ#1514040)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass 1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection 1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling
- Package List:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.3):
Source: kernel-3.10.0-514.41.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-514.41.1.el7.noarch.rpm kernel-doc-3.10.0-514.41.1.el7.noarch.rpm
x86_64: kernel-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm kernel-devel-3.10.0-514.41.1.el7.x86_64.rpm kernel-headers-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.41.1.el7.x86_64.rpm perf-3.10.0-514.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm python-perf-3.10.0-514.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):
x86_64: kernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 7.3):
Source: kernel-3.10.0-514.41.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-514.41.1.el7.noarch.rpm kernel-doc-3.10.0-514.41.1.el7.noarch.rpm
ppc64: kernel-3.10.0-514.41.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-514.41.1.el7.ppc64.rpm kernel-debug-3.10.0-514.41.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-514.41.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.41.1.el7.ppc64.rpm kernel-devel-3.10.0-514.41.1.el7.ppc64.rpm kernel-headers-3.10.0-514.41.1.el7.ppc64.rpm kernel-tools-3.10.0-514.41.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-514.41.1.el7.ppc64.rpm perf-3.10.0-514.41.1.el7.ppc64.rpm perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm python-perf-3.10.0-514.41.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm
ppc64le: kernel-3.10.0-514.41.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debug-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.41.1.el7.ppc64le.rpm kernel-devel-3.10.0-514.41.1.el7.ppc64le.rpm kernel-headers-3.10.0-514.41.1.el7.ppc64le.rpm kernel-tools-3.10.0-514.41.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-514.41.1.el7.ppc64le.rpm perf-3.10.0-514.41.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm python-perf-3.10.0-514.41.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm
s390x: kernel-3.10.0-514.41.1.el7.s390x.rpm kernel-debug-3.10.0-514.41.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-514.41.1.el7.s390x.rpm kernel-debug-devel-3.10.0-514.41.1.el7.s390x.rpm kernel-debuginfo-3.10.0-514.41.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-514.41.1.el7.s390x.rpm kernel-devel-3.10.0-514.41.1.el7.s390x.rpm kernel-headers-3.10.0-514.41.1.el7.s390x.rpm kernel-kdump-3.10.0-514.41.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-514.41.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-514.41.1.el7.s390x.rpm perf-3.10.0-514.41.1.el7.s390x.rpm perf-debuginfo-3.10.0-514.41.1.el7.s390x.rpm python-perf-3.10.0-514.41.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.s390x.rpm
x86_64: kernel-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm kernel-devel-3.10.0-514.41.1.el7.x86_64.rpm kernel-headers-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.41.1.el7.x86_64.rpm perf-3.10.0-514.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm python-perf-3.10.0-514.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 7.3):
ppc64: kernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.41.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-514.41.1.el7.ppc64.rpm perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm
ppc64le: kernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.41.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-514.41.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm
x86_64: kernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/speculativeexecution https://access.redhat.com/security/cve/CVE-2017-5753 https://access.redhat.com/security/cve/CVE-2017-5715 https://access.redhat.com/security/cve/CVE-2017-5754
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFaacZpXlSAg2UNWIIRAioFAJ9P+LP2qadmzmAR5WEaU5UvaOifqgCdFhO+ FkImA43txPx8uAAK1eD546Y= =evDX -----END PGP SIGNATURE-----
-- RHSA-announce mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhsa-announce . Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. ========================================================================== Ubuntu Security Notice USN-3542-1 January 23, 2018
linux vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were addressed in the Linux kernel. This flaw is known as Spectre.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: linux-image-3.13.0-141-generic 3.13.0-141.190 linux-image-3.13.0-141-lowlatency 3.13.0-141.190 linux-image-generic 3.13.0.141.151 linux-image-lowlatency 3.13.0.141.151
Please note that fully mitigating CVE-2017-5715 (Spectre Variant 2) requires corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. On i386 and amd64 architectures, the IBRS and IBPB features are required to enable the kernel mitigations. Ubuntu is working with Intel and AMD to provide future microcode updates that implement IBRS and IBPB as they are made available. Ubuntu users with a processor from a different vendor should contact the vendor to identify necessary firmware updates. Ubuntu will provide corresponding QEMU updates in the future for users of self-hosted virtual environments in coordination with upstream QEMU. Ubuntu users in cloud environments should contact the cloud provider to confirm that the hypervisor has been updated to expose the new CPU features to virtual machines.
Software Description: - firefox: Mozilla Open Source web browser
Details:
It was discovered that speculative execution performed by modern CPUs could leak information through a timing side-channel attack, and that this could be exploited in web browser JavaScript engines. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information from other domains, bypassing same-origin restrictions. (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754). 7.2) - noarch, x86_64
In this update mitigations for x86-64 architecture are provided. (CVE-2017-5754, Important)
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://softwaresupport.hpe.com/document/-/facetsearch/document/KM03158629
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: KM03158629 Version: 2
MFSBGN03802 - Virtualization Performance Viewer (vPV) / Cloud Optimizer, Local Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2018-05-11 Last Updated: 2018-05-10
Potential Security Impact: Local: Disclosure of Information
Source: Micro Focus, Product Security Response Team
VULNERABILITY SUMMARY A potential vulnerability has been identified in 3rd party component used by Micro Focus Virtualization Performance Viewer (vPV) / Cloud Optimizer Virtual Appliance.
References:
- CVE-2017-5753
- CVE-2017-5715
- CVE-2017-5754
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Virtualization Performance Viewer Software - v2.20, v3.0, v3.01, v3.02, v3.03
- HPE Cloud Optimizer - v2.20, v3.0, v3.01, v3.02, v3.03
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
RESOLUTION
Micro Focus is actively working with its vendors to address any systems-level Spectre and Meltdown impacts.However, if you have immediate concerns or questions regarding CentOS and its approach to Spectre or Meltdown, please contact them directly.
HISTORY
Version:1 (rev.1) - 12 April 2018 Initial release
Version:2 (rev.2) - 10 May 2018 Vulnerability Summary
Third Party Security Patches: Third party security patches that are to be installed on systems running Micro Focus products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal Micro Focus services support channel. For other issues about the content of this Security Bulletin, send e-mail to [email protected].
Report: To report a potential security vulnerability for any supported product: Web form: https://www.microfocus.com/support-and-services/report-security Email: [email protected]
Subscribe: To initiate receiving subscriptions for future Micro Focus Security Bulletin alerts via Email, please subscribe here - https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification Once you are logged in to the portal, please choose security bulletins under product and document types. Please note that you will need to sign in using a Passport account. If you do not have a Passport account yet, you can create one- its free and easy https://cf.passport.softwaregrp.com/hppcf/createuser.do
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://softwaresupport.hpe.com/security-vulnerability
Software Product Category: The Software Product Category is represented in the title by the two characters following Micro Focus Security Bulletin.
3P = 3rd Party Software GN = Micro Focus General Software MU = Multi-Platform Software
System management and security procedures must be reviewed frequently to maintain system integrity. Micro Focus is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"Micro Focus is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected Micro Focus products the important security information contained in this Bulletin. Micro Focus recommends that all users determine the applicability of this information to their individual situations and take appropriate action. Micro Focus does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, Micro Focus will not be responsible for any damages resulting from user's use or disregard of the information provided in this Security Bulletin. To the extent permitted by law, Micro Focus disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2017 EntIT Software LLC
Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither Micro Focus nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Micro Focus and the names of Micro Focus products referenced herein are trademarks of Micro Focus in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-1712", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "xeon e5 2650l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "720qm" }, { "model": "xeon e3 1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7235" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6585r" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3710" }, { "model": "xeon e5 2430l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210m" }, { "model": "xeon e3 1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10c" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5550" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6154" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v3" }, { "model": "cortex-a75", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "740qm" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6510" }, { "model": "xeon e3 1225 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3235rk" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4720hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4000m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2405s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2435m" }, { "model": "bl ppc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3380m" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1545m_v5" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360" }, { "model": "xeon e5 2637", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2518" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3317u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700ec" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "460m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4807" }, { "model": "vl bpc 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3480" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3580" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y32" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5677" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330m" }, { "model": "xeon e3 1278l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x6550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5750hq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160" }, { "model": "bl2 bpc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570r" }, { "model": "xeon e3 1265l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2760qm" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134m" }, { "model": "xeon e5 2430 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "650" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3295rk" }, { "model": "xeon e3 1280 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4109t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5550u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3690" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v2" }, { "model": "xeon e5 2603 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6260u" }, { "model": "xeon e5 2620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1281 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660" }, { "model": "xeon e5 2450l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.10" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735d" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2340ue" }, { "model": "xeon e5 2630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867l" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5618" }, { "model": "local service management system", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "13.2" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y30" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775c" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8180" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "760" }, { "model": "el ppc 1000\\/m", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460" }, { "model": "xeon e3 1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2650l_v4" }, { "model": "xeon e5 2420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675c" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v2" }, { "model": "xeon e5 2648l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5557u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v3" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3445" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3455" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517u" }, { "model": "vl2 ppc7 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "workstation", "scope": "gte", "trust": 1.0, "vendor": "vmware", "version": "12.0.0" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2629m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3700" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138f" }, { "model": "esxi", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "6.5" }, { "model": "xeon e5 2438l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5257u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5502" }, { "model": "xeon bronze 3106", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2480" }, { "model": "xeon e5 2470 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x5-e3930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600t" }, { "model": "xeon e5 2407 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2450 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2675qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2940" }, { "model": "xeon e5 2609 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350k" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1850" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2358" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460t" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7285" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460s" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2900" }, { "model": "xeon e5 2609 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2550" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3808" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3350" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5200u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4260u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5506" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126f" }, { "model": "vl2 ppc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "vl2 bpc 9000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4750hq" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1515m_v5" }, { "model": "xeon e3 1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640" }, { "model": "vl2 ppc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "vl2 ppc 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qm" }, { "model": "xeon e5 2418l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4722hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5500u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8650u" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3205rk" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v5" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2540m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5650" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3720qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210" }, { "model": "core m7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y75" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3785" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820eq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3827" }, { "model": "cortex-a72", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2102" }, { "model": "fusion", "scope": "lt", "trust": 1.0, "vendor": "vmware", "version": "8.5.9" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170t" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "42.3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610me" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1800" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330e" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3010" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "470um" }, { "model": "xeon e5 1428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v3" }, { "model": "xeon e5 2430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "local service management system", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "13.3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4890_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5649" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "610e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370t" }, { "model": "el ppc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e5 2428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2640 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667" }, { "model": "xeon e5 2618l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2300" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "530" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660lm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5690" }, { "model": "xeon e5 2643 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2390t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4105" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2515e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3530" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4880_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176f" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1565l_v5" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4648_v3" }, { "model": "cortex-a9", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600u" }, { "model": "xeon e5 1660 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2467m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850hq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5680" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8857_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8837" }, { "model": "xeon e5 2620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4800mq" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2830" }, { "model": "xeon e3 1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3406" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4628l_v4" }, { "model": "xeon e5 2618l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3480" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2665" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v2" }, { "model": "xeon e3 1220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500t" }, { "model": "xeon e5 2630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2550k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3689y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700hq" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3538" }, { "model": "xeon e3 1265l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5672" }, { "model": "xeon e5 1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hk" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v2" }, { "model": "bl2 bpc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3570" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3350p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3440" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3560" }, { "model": "xeon e5 1680 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3437u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300y" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3460" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3355" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6157u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5667" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160f" }, { "model": "bl bpc 7001", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4624l_v2" }, { "model": "xeon e5 1650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140m" }, { "model": "xeon e3 1268l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4550u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2520" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200u" }, { "model": "xeon e5 2608l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2803" }, { "model": "xeon e5 2643 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5518" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980x" }, { "model": "simatic itc1900", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "xeon e5 1620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2538" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3308" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y51" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4250u" }, { "model": "xeon e5 2637 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770r" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607" }, { "model": "vl2 ppc9 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3955" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2357m" }, { "model": "xeon e3 1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hq" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2460" }, { "model": "xeon e3 1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8158" }, { "model": "bl ppc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6006u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4158u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217ue" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2750" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585l_v5" }, { "model": "xeon e5 2408l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3758" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3360m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7530" }, { "model": "xeon e5 1650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2348m" }, { "model": "vs960hd", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": null }, { "model": "cortex-a73", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "bl2 ppc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e3 1275 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v2" }, { "model": "xeon e3 1240 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v2" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3229y" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3845" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2308" }, { "model": "xeon e3 1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702ec" }, { "model": "bl bpc 2001", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650" }, { "model": "xeon e5 2637 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620ue" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5503" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6200u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4510u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5640" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126" }, { "model": "diskstation manager", "scope": "lt", "trust": 1.0, "vendor": "synology", "version": "6.2.2-24922" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200m" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y71" }, { "model": "xeon e5 2630l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5122" }, { "model": "fusion", "scope": "gte", "trust": 1.0, "vendor": "vmware", "version": "8.0.0" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2370m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3427u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5575r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4558u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710mq" }, { "model": "bl rackmount 4u", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8168" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2630qm" }, { "model": "xeon e3 1241 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4422e" }, { "model": "xeon e3 1230l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "vl2 ppc12 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2312m" }, { "model": "xeon e3 1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v3" }, { "model": "cortex-a8", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7555" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700" }, { "model": "xeon e3 1271 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3635qm" }, { "model": "xeon e3 1260l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6167u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330te" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134" }, { "model": "esxi", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "6.0" }, { "model": "xeon e3 1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7567u" }, { "model": "xeon e5 1650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "965" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3115c" }, { "model": "vl2 bpc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e3 1245 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "dl ppc18.5m 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5670" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2738" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940xm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3430" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660ue" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "975" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5675" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450m" }, { "model": "xeon e3 1240 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658" }, { "model": "xeon e5 2623 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qm" }, { "model": "valueline ipc", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e3 1285 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4000" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3470" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4760hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "990x" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200h" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8600k" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6146" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4960hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v3" }, { "model": "xeon e5 2628l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v3" }, { "model": "xeon e5 2630 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450s" }, { "model": "vl bpc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3590" }, { "model": "xeon e5 1428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v3" }, { "model": "xeon e5 2448l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5549" }, { "model": "xeon e5 2428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745d" }, { "model": "cortex-x1", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7545" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850eq" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2350" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2560" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2758" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120me" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7560u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5508" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860" }, { "model": "cortex-a77", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5509" }, { "model": "xeon e5 2637 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v3" }, { "model": "cortex-r7", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y75" }, { "model": "xeon e3 1285l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3958" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6102e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4302y" }, { "model": "xeon e5 2418l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3805" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3825" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770d" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3337u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3508" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8153" }, { "model": "xeon e5 2603 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5118" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2910" }, { "model": "bl ppc15 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3405" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2657m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5250u" }, { "model": "xeon e3 1286l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1660 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170" }, { "model": "cortex-a76", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5115" }, { "model": "xeon e3 12201 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590t" }, { "model": "xeon e5 2640 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500k" }, { "model": "hci", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "bl rackmount 2u", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "880" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3820qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2520m" }, { "model": "virtual machine manager", "scope": "lt", "trust": 1.0, "vendor": "synology", "version": "6.2-23739" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650u" }, { "model": "xeon e3 1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "bl2 bpc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5640" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4005" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3826" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2367m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3740qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2808" }, { "model": "xeon e3 1225 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5647" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4980hq" }, { "model": "vl ppc 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3710" }, { "model": "xeon e3 1240l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2715qe" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4020y" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3460" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2130" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3670" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670" }, { "model": "bl ppc17 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v2" }, { "model": "atom x7-e3950", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2430l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2718" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2610ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "390m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v3" }, { "model": "cortex-a78ae", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "cortex-a57", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon e5 2448l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4025u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6360u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7920hq" }, { "model": "xeon e5 2407", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870hq" }, { "model": "xeon e3 1275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v3" }, { "model": "xeon e3 1270 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "930" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2655le" }, { "model": "xeon e3 1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2807" }, { "model": "xeon e3 1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v3" }, { "model": "bl ppc17 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y31" }, { "model": "xeon e5 2618l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8550u" }, { "model": "xeon e3 1220 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150t" }, { "model": "vl2 bpc 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5506" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920xm" }, { "model": "xeon e3 1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3630qm" }, { "model": "xeon e5 2450l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670k" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2840" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7542" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620m" }, { "model": "xeon e3 1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2410m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400t" }, { "model": "xeon e5 1620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3130" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3339y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2620m" }, { "model": "xeon e3 1276 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1558l_v5" }, { "model": "xeon e3 1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4108" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2516" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2960xm" }, { "model": "xeon e5 2650l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "840qm" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699r_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4400e" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6152" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3815" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v4" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2920" }, { "model": "xeon e5 1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6685r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770s" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2815" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230f" }, { "model": "xeon e3 1220l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "970" }, { "model": "xeon e3 1230 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "vl ppc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3225" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "875k" }, { "model": "xeon e3 1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350h" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1578l_v5" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3840qm" }, { "model": "xeon e3 1226 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v6" }, { "model": "vl2 bpc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4308u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2920xm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3338" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712mq" }, { "model": "xeon e5 1428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3230m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2720qm" }, { "model": "simatic itc1500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3227u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740d" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5530" }, { "model": "router manager", "scope": "gte", "trust": 1.0, "vendor": "synology", "version": "1.1" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w" }, { "model": "bl2 ppc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "simatic itc2200 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2930" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5539" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5157u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8164" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658a_v3" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690" }, { "model": "xeon e5 2648l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "neoverse n2", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon e5 2603", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2380p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5528" }, { "model": "xeon e3 1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "vl2 ppc 9000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700mq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v3" }, { "model": "diskstation manager", "scope": "gte", "trust": 1.0, "vendor": "synology", "version": "5.2" }, { "model": "dl ppc15m 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5606" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4005u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640lm" }, { "model": "xeon e5 2628l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y57" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "820qm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3450" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600k" }, { "model": "xeon e3 1285 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "bl bpc 3001", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2730" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3426" }, { "model": "xeon e3 12201", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v4" }, { "model": "xeon e5 2418l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3475s" }, { "model": "simatic winac rtx \\ 2010", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "2010" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340te" }, { "model": "simatic itc2200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2637m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3750" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120m" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1750" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "580m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5540" }, { "model": "xeon e5 1630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6136" }, { "model": "xeon e5 2450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699a_v4" }, { "model": "xeon e5 2403", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4785t" }, { "model": "bl2 ppc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2375m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860hq" }, { "model": "xeon e3 1270 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3200rk" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770te" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585_v5" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "670" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "960" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6128" }, { "model": "dl ppc21.5m 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e5 2403 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440eq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2700k" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3230rk" }, { "model": "xeon e3 1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7540" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v2" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2649m" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4205" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2580" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142" }, { "model": "router manager", "scope": "lt", "trust": 1.0, "vendor": "synology", "version": "1.1.7-6941-1" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6402p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8830" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7295" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5660" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.04" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660um" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3950" }, { "model": "bl ppc15 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2617m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697a_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870" }, { "model": "xeon e3 1245 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3667u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v3" }, { "model": "cortex-a17", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2806" }, { "model": "cortex-a15", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon e5 1630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775r" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736f" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2557m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620le" }, { "model": "simatic itc1500 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4578u" }, { "model": "xeon e5 2470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "local service management system", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "13.1" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6144" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3050" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2316" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "350m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030u" }, { "model": "xeon e5 2648l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5645" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v3" }, { "model": "bl bpc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5590" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4910mq" }, { "model": "bl ppc12 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6287u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100u" }, { "model": "xeon e3 1220 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-1105c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v3" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "10" }, { "model": "vl bpc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e3 1258l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4202y" }, { "model": "btc14", "scope": "eq", "trust": 1.0, "vendor": "pepperl fuchs", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100h" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2320" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8250u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3858" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2508" }, { "model": "xeon e3 1235", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650l" }, { "model": "xeon e3 1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3520m" }, { "model": "xeon e5 2640 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7660u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4410e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5638" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1575m_v5" }, { "model": "xeon e3 1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750" }, { "model": "xeon e5 2609 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "370m" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2810" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1900" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360t" }, { "model": "vs360hd", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": null }, { "model": "simatic itc1900 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2430m" }, { "model": "xeon e5 1620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210f" }, { "model": "simatic winac rtx \\ 2010", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2010" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6132" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5630" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2890_v2" }, { "model": "xeon e5 1660 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "bl ppc17 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4200" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v4" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5607" }, { "model": "xeon e3 1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4012y" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y70" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4771" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "42.2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520e" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3520" }, { "model": "xeon e5 2420 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6540" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5518" }, { "model": "workstation", "scope": "lt", "trust": 1.0, "vendor": "vmware", "version": "12.5.8" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5650u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176m" }, { "model": "skynas", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": null }, { "model": "neoverse n1", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620um" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5620" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "480m" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775d" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620lm" }, { "model": "xeon e3 1246 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1265l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4278u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3130m" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230" }, { "model": "xeon e3 1275l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2640m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340" }, { "model": "cortex-a12", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5119t" }, { "model": "xeon e5 2623 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v4" }, { "model": "esxi", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "5.5.0" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2125" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2805" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4657l_v2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y30" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517ue" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5570" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5520" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3320m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3245" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2420" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2510e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3632qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710hq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6150" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3687u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5015u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6267u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300u" }, { "model": "atom x5-e3940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1285l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v4" }, { "model": "solidfire", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4765t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3830" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670t" }, { "model": "xeon e5 1660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3680" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5287u" }, { "model": "xeon e5 2630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v3" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2635qm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670r" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v4" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300" }, { "model": "xeon e3 1230 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v4" }, { "model": "xeon e5 2440 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5603" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790t" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "11.3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "655k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4102e" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1505m_v6" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4810mq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250f" }, { "model": "btc12", "scope": "eq", "trust": 1.0, "vendor": "pepperl fuchs", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8400" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5609" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210h" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3708" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6442eq" }, { "model": "xeon e3 1290 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2648l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1680 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3439y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2365m" }, { "model": "xeon e3 1231 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8156" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6098p" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790k" }, { "model": "cortex-r8", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5504" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4288u" }, { "model": "bl bpc 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4900mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5630" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2537m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3555le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350u" }, { "model": "xeon e3 1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5020u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "661" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2677m" }, { "model": "xeon e5 2628l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3510" }, { "model": "el ppc 1000\\/wt", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2338" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8894_v4" }, { "model": "xeon e3 1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4258u" }, { "model": "xeon e5 2609", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5507" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2820" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680" }, { "model": "xeon e5 2640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610y" }, { "model": "bl ppc15 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5010u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4617" }, { "model": "xeon e3 1280 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2377m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2115c" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2710qe" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5580" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4120u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2350m" }, { "model": "xeon e3 1105c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4220y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500te" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7560" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6350hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430s" }, { "model": "xeon e3 1286 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3450" }, { "model": "xeon bronze 3104", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1290", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2880_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6320" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5005u" }, { "model": "vl2 bpc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680um" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3795" }, { "model": "vl2 ppc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "bl bpc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "450m" }, { "model": "visunet rm shell", "scope": "eq", "trust": 1.0, "vendor": "pepperl fuchs", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702hq" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10a" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5687" }, { "model": "xeon e3 1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v4" }, { "model": "cortex-a78", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon e5 2620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330e" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y54" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2328m" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380um" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2105" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3150" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3000" }, { "model": "xeon e5 2608l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "dl ppc15 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "vl ipc p7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440hq" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3265rk" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3537u" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "amd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "arm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell emc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "qualcomm incorporated", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "synology", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": "windows sp1", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "7" }, { "model": "internet explorer", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "11" }, { "model": "windows", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "8.1" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "google", "version": "v8" }, { "model": "windows", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "10" }, { "model": "edge", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "0" }, { "model": "xeon cpu e5-1650", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "cortex a57", "scope": null, "trust": 0.6, "vendor": "arm", "version": null }, { "model": "pro a8-9600 r7", "scope": null, "trust": 0.6, "vendor": "amd", "version": null }, { "model": "compute cores 4c+6g", "scope": "eq", "trust": 0.6, "vendor": "amd", "version": "10" }, { "model": "fx -8320 eight-core processor", "scope": null, "trust": 0.6, "vendor": "amd", "version": null }, { "model": "windows server", "scope": null, "trust": 0.6, "vendor": "microsoft", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "145719" }, { "db": "PACKETSTORM", "id": "146090" }, { "db": "PACKETSTORM", "id": "145655" }, { "db": "PACKETSTORM", "id": "145635" } ], "trust": 0.4 }, "cve": "CVE-2017-5753", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2017-5753", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CNVD-2018-00304", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-113956", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2017-5753", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2017-5753", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-00304", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-113956", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-5753", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Two vulnerabilities are identified, known as \"Variant 3a\" and \"Variant 4\". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \\\"melts\\\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \\\"cross-border\\\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Xeon CPU E5-1650 v3, v2, v4; Xeon E3-1265l v2, v3, v4 ; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. \n\nCVE-2017-17975\n\n Tuba Yavuz reported a use-after-free flaw in the USBTV007\n audio-video grabber driver. \n\nCVE-2017-18218\n\n Jun He reported a user-after-free flaw in the Hisilicon HNS ethernet\n driver. \n\nCVE-2017-18222\n\n It was reported that the Hisilicon Network Subsystem (HNS) driver\n implementation does not properly handle ethtool private flags. \n\nCVE-2017-18257\n\n It was reported that the f2fs implementation is prone to an infinite\n loop caused by an integer overflow in the __get_data_block()\n function. \n\nCVE-2018-1065\n\n The syzkaller tool found a NULL pointer dereference flaw in the\n netfilter subsystem when handling certain malformed iptables\n rulesets. \n\nCVE-2018-1108\n\n Jann Horn reported that crng_ready() does not properly handle the\n crng_init variable states and the RNG could be treated as\n cryptographically safe too early after system boot. \n\nCVE-2018-7480\n\n Hou Tao discovered a double-free flaw in the blkcg_init_queue()\n function in block/blk-cgroup.c. Relevant releases/architectures:\n\nRHEL 7-based RHEV-H - noarch\n\n3. These\npackages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. RHVH features a Cockpit user interface for\nmonitoring the host\u0027s resources and performing administrative tasks. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2018-1-8-3 Safari 11.0.2\n\nSafari 11.0.2 is now available and and addresses the following:\n\nAvailable for: OS X El Capitan 10.11.6 and macOS Sierra 10.12.6\nDescription: Safari 11.0.2 includes security improvements to mitigate\nthe effects of Spectre (CVE- 2017-5753 and CVE-2017-5715). \n\nWe would like to acknowledge Jann Horn of Google Project Zero; and\nPaul Kocher in collaboration with Daniel Genkin of University of\nPennsylvania and University of Maryland, Daniel Gruss of Graz\nUniversity of Technology, Werner Haas of Cyberus Technology,\nMike Hamburg of Rambus (Cryptography Research Division),\nMoritz Lipp of Graz University of Technology, Stefan Mangard of\nGraz University of Technology, Thomas Prescher of Cyberus Technology,\nMichael Schwarz of Graz University of Technology, and Yuval Yarom of\nUniversity of Adelaide and Data61 for their assistance. \n\nInstallation note:\n\nSafari 11.0.2 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4187-1 [email protected]\nhttps://www.debian.org/security/ Ben Hutchings\nMay 01, 2018 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : linux\nCVE ID : CVE-2015-9016 CVE-2017-0861 CVE-2017-5715 CVE-2017-5753\n CVE-2017-13166 CVE-2017-13220 CVE-2017-16526 CVE-2017-16911\n CVE-2017-16912 CVE-2017-16913 CVE-2017-16914 CVE-2017-18017\n CVE-2017-18203 CVE-2017-18216 CVE-2017-18232 CVE-2017-18241\n CVE-2018-1066 CVE-2018-1068 CVE-2018-1092 CVE-2018-5332\n CVE-2018-5333 CVE-2018-5750 CVE-2018-5803 CVE-2018-6927\n CVE-2018-7492 CVE-2018-7566 CVE-2018-7740 CVE-2018-7757\n CVE-2018-7995 CVE-2018-8781 CVE-2018-8822 CVE-2018-1000004\n CVE-2018-1000199\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks. \n\nCVE-2015-9016\n\n Ming Lei reported a race condition in the multiqueue block layer\n (blk-mq). On a system with a driver using blk-mq (mtip32xx,\n null_blk, or virtio_blk), a local user might be able to use this\n for denial of service or possibly for privilege escalation. \n\nCVE-2017-0861\n\n Robb Glasser reported a potential use-after-free in the ALSA (sound)\n PCM core. We believe this was not possible in practice. \n\nCVE-2017-5715\n\n Multiple researchers have discovered a vulnerability in various\n processors supporting speculative execution, enabling an attacker\n controlling an unprivileged process to read memory from arbitrary\n addresses, including from the kernel and all other processes\n running on the system. \n\n This specific attack has been named Spectre variant 2 (branch\n target injection) and is mitigated for the x86 architecture (amd64\n and i386) by using the \"retpoline\" compiler feature which allows\n indirect branches to be isolated from speculative execution. \n\nCVE-2017-5753\n\n Multiple researchers have discovered a vulnerability in various\n processors supporting speculative execution, enabling an attacker\n controlling an unprivileged process to read memory from arbitrary\n addresses, including from the kernel and all other processes\n running on the system. \n\n This specific attack has been named Spectre variant 1\n (bounds-check bypass) and is mitigated by identifying vulnerable\n code sections (array bounds checking followed by array access) and\n replacing the array access with the speculation-safe\n array_index_nospec() function. \n\n More use sites will be added over time. \n\nCVE-2017-13166\n\n A bug in the 32-bit compatibility layer of the v4l2 ioctl handling\n code has been found. Memory protections ensuring user-provided\n buffers always point to userland memory were disabled, allowing\n destination addresses to be in kernel space. On a 64-bit kernel a\n local user with access to a suitable video device can exploit this\n to overwrite kernel memory, leading to privilege escalation. \n\nCVE-2017-13220\n\n Al Viro reported that the Bluetooth HIDP implementation could\n dereference a pointer before performing the necessary type check. \n A local user could use this to cause a denial of service. \n\nCVE-2017-16526\n\n Andrey Konovalov reported that the UWB subsystem may dereference\n an invalid pointer in an error case. A local user might be able\n to use this for denial of service. \n\nCVE-2017-16911\n\n Secunia Research reported that the USB/IP vhci_hcd driver exposed\n kernel heap addresses to local users. This information could aid the\n exploitation of other vulnerabilities. \n\nCVE-2017-16912\n\n Secunia Research reported that the USB/IP stub driver failed to\n perform a range check on a received packet header field, leading\n to an out-of-bounds read. A remote user able to connect to the\n USB/IP server could use this for denial of service. \n\nCVE-2017-16913\n\n Secunia Research reported that the USB/IP stub driver failed to\n perform a range check on a received packet header field, leading\n to excessive memory allocation. A remote user able to connect to\n the USB/IP server could use this for denial of service. \n\nCVE-2017-16914\n\n Secunia Research reported that the USB/IP stub driver failed to\n check for an invalid combination of fields in a received packet,\n leading to a null pointer dereference. A remote user able to\n connect to the USB/IP server could use this for denial of service. \n\nCVE-2017-18017\n\n Denys Fedoryshchenko reported that the netfilter xt_TCPMSS module\n failed to validate TCP header lengths, potentially leading to a\n use-after-free. If this module is loaded, it could be used by a\n remote attacker for denial of service or possibly for code\n execution. \n\nCVE-2017-18203\n\n Hou Tao reported that there was a race condition in creation and\n deletion of device-mapper (DM) devices. A local user could\n potentially use this for denial of service. \n\nCVE-2017-18216\n\n Alex Chen reported that the OCFS2 filesystem failed to hold a\n necessary lock during nodemanager sysfs file operations,\n potentially leading to a null pointer dereference. A local user\n could use this for denial of service. \n\nCVE-2017-18232\n\n Jason Yan reported a race condition in the SAS (Serial-Attached\n SCSI) subsystem, between probing and destroying a port. This\n could lead to a deadlock. A physically present attacker could\n use this to cause a denial of service. \n\nCVE-2017-18241\n\n Yunlei He reported that the f2fs implementation does not properly\n initialise its state if the \"noflush_merge\" mount option is used. \n A local user with access to a filesystem mounted with this option\n could use this to cause a denial of service. \n\nCVE-2018-1066\n\n Dan Aloni reported to Red Hat that the CIFS client implementation\n would dereference a null pointer if the server sent an invalid\n response during NTLMSSP setup negotiation. This could be used\n by a malicious server for denial of service. \n\nCVE-2018-1068\n\n The syzkaller tool found that the 32-bit compatibility layer of\n ebtables did not sufficiently validate offset values. On a 64-bit\n kernel, a local user with the CAP_NET_ADMIN capability (in any user\n namespace) could use this to overwrite kernel memory, possibly\n leading to privilege escalation. Debian disables unprivileged user\n namespaces by default. \n\nCVE-2018-1092\n\n Wen Xu reported that a crafted ext4 filesystem image would\n trigger a null dereference when mounted. A local user able\n to mount arbitrary filesystems could use this for denial of\n service. \n\nCVE-2018-5332\n\n Mohamed Ghannam reported that the RDS protocol did not\n sufficiently validate RDMA requests, leading to an out-of-bounds\n write. A local attacker on a system with the rds module loaded\n could use this for denial of service or possibly for privilege\n escalation. \n\nCVE-2018-5333\n\n Mohamed Ghannam reported that the RDS protocol did not properly\n handle an error case, leading to a null pointer dereference. A\n local attacker on a system with the rds module loaded could\n possibly use this for denial of service. \n\nCVE-2018-5750\n\n Wang Qize reported that the ACPI sbshc driver logged a kernel heap\n address. This information could aid the exploitation of other\n vulnerabilities. \n\nCVE-2018-5803\n\n Alexey Kodanev reported that the SCTP protocol did not range-check\n the length of chunks to be created. A local or remote user could\n use this to cause a denial of service. \n\nCVE-2018-6927\n\n Li Jinyue reported that the FUTEX_REQUEUE operation on futexes did\n not check for negative parameter values, which might lead to a\n denial of service or other security impact. \n\nCVE-2018-7492\n\n The syzkaller tool found that the RDS protocol was lacking a null\n pointer check. A local attacker on a system with the rds module\n loaded could use this for denial of service. \n\nCVE-2018-7566\n\n Fan LongFei reported a race condition in the ALSA (sound)\n sequencer core, between write and ioctl operations. This could\n lead to an out-of-bounds access or use-after-free. A local user\n with access to a sequencer device could use this for denial of\n service or possibly for privilege escalation. \n\nCVE-2018-7740\n\n Nic Losby reported that the hugetlbfs filesystem\u0027s mmap operation\n did not properly range-check the file offset. A local user with\n access to files on a hugetlbfs filesystem could use this to cause\n a denial of service. \n\nCVE-2018-7757\n\n Jason Yan reported a memory leak in the SAS (Serial-Attached\n SCSI) subsystem. A local user on a system with SAS devices\n could use this to cause a denial of service. \n\nCVE-2018-7995\n\n Seunghun Han reported a race condition in the x86 MCE\n (Machine Check Exception) driver. This is unlikely to have\n any security impact. \n\nCVE-2018-8781\n\n Eyal Itkin reported that the udl (DisplayLink) driver\u0027s mmap\n operation did not properly range-check the file offset. A local\n user with access to a udl framebuffer device could exploit this to\n overwrite kernel memory, leading to privilege escalation. \n\nCVE-2018-8822\n\n Dr Silvio Cesare of InfoSect reported that the ncpfs client\n implementation did not validate reply lengths from the server. An\n ncpfs server could use this to cause a denial of service or\n remote code execution in the client. \n\nCVE-2018-1000004\n\n Luo Quan reported a race condition in the ALSA (sound) sequencer\n core, between multiple ioctl operations. This could lead to a\n deadlock or use-after-free. A local user with access to a\n sequencer device could use this for denial of service or possibly\n for privilege escalation. \n\nCVE-2018-1000199\n\n Andy Lutomirski discovered that the ptrace subsystem did not\n sufficiently validate hardware breakpoint settings. Local users\n can use this to cause a denial of service, or possibly for\n privilege escalation, on x86 (amd64 and i386) and possibly other\n architectures. \n\nFor the oldstable distribution (jessie), these problems have been fixed\nin version 3.16.56-1. \n\nWe recommend that you upgrade your linux packages. \n\nFor the detailed security status of linux please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/linux\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: [email protected]\n-----BEGIN PGP SIGNATURE-----\n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\nCxfIO0FNCzO0WIUf40md7MlIAnDBIRGyYgNIIe7AnSRKKPykEx8=\n=wNQS\n-----END PGP SIGNATURE-----\n. \nIssue date: 2018-01-03\nUpdated on: 2018-01-09\nCVE number: CVE-2017-5753, CVE-2017-5715\n\n1. \n\n Notes:\n\n Hypervisor mitigation can be classified into the two following\n categories:\n - Hypervisor-Specific remediation (documented in this advisory)\n - Hypervisor-Assisted Guest Remediation (documented in\n VMSA-2018-0004)\n\n The ESXi patches and new versions of Workstation and Fusion of\n VMSA-2018-0004 include the Hypervisor-Specific remediation documented\n in this VMware Security Advisory. \n\n More information on the types of remediation may be found in VMware\n Knowledge Base article 52245. Relevant Products\n\n VMware vSphere ESXi (ESXi)\n VMware Workstation Pro / Player (Workstation)\n VMware Fusion Pro / Fusion (Fusion)\n\n3. Problem Description\n\n Bounds Check bypass and Branch Target Injection issues\n\n CPU data cache timing can be abused to efficiently leak information\n out of mis-speculated CPU execution, leading to (at worst) arbitrary\n virtual memory read vulnerabilities across local security boundaries\n in various contexts. \n\n Result of exploitation may allow for information disclosure from one\n Virtual Machine to another Virtual Machine that is running on the\n same host. The remediation listed in the table below is for the known\n variants of the Bounds Check Bypass and Branch Target Injection\n issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the identifiers CVE-2017-5753 (Bounds Check bypass) and\n CVE-2017-5715 (Branch Target Injection) to these issues. \n\n Column 5 of the following table lists the action required to\n remediate the observed vulnerability in each release, if a solution\n is available. \n\n VMware Product Running Replace with/ Mitigation\n Product Version on Severity Apply patch Workaround\n ========== ======= ======= ========= ============= ==========\n\n ESXi 6.5 Any Important ESXi650-201712101-SG None\n ESXi 6.0 Any Important ESXi600-201711101-SG None\n ESXi 5.5 Any Important ESXi550-201801401-BG None\n\n Workstation 14.x Any N/A Not affected N/A\n Workstation 12.x Any Important 12.5.8 None\n\n Fusion 10.x OS X N/A Not affected N/A\n Fusion 8.x OS X Important 8.5.9 None\n\n\n4. Solution\n\n Please review the patch/release notes for your product and\n version and verify the checksum of your downloaded file. \n\n VMware ESXi 6.5\n Downloads:\n https://my.vmware.com/group/vmware/patch\n Documentation:\n http://kb.vmware.com/kb/2151099\n\n VMware ESXi 6.0\n Downloads:\n https://my.vmware.com/group/vmware/patch\n Documentation:\n http://kb.vmware.com/kb/2151132\n\n VMware ESXi 5.5\n Downloads:\n https://my.vmware.com/group/vmware/patch\n Documentation:\n http://kb.vmware.com/kb/52127\n\n VMware Workstation Pro, Player 12.5.8\n Downloads and Documentation:\n https://www.vmware.com/go/downloadworkstation\n https://www.vmware.com/support/pubs/ws_pubs.html\n\n VMware Fusion Pro / Fusion 12.5.9\n Downloads and Documentation:\n https://www.vmware.com/go/downloadfusion\n https://www.vmware.com/support/pubs/fusion_pubs.html\n\n\n5. Change log\n\n 2018-01-03 VMSA-2018-0002\n Initial security advisory\n\n 2018-01-09 VMSA-2018-0002.1\n Updated security advisor after release of ESXi 5.5 patch\n (ESXi550-201801401-BG) that has remediation against CVE-2017-5715 and\n CVE-2017-5753 on 2018-01-09. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n [email protected]\n [email protected]\n [email protected]\n\n E-mail: [email protected]\n PGP key at: https://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Support Phases\n https://www.vmware.com/support/policies/lifecycle.html\n\n VMware Security \u0026 Compliance Blog\n https://blogs.vmware.com/security\n\n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2018 VMware Inc. All rights reserved. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7.3\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64\n\n3. \n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a commonly\nused performance optimization). There are three primary variants of the\nissue which differ in the way the speculative execution can be exploited. \n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software mitigation\nfor this hardware issue at a cost of potential performance penalty. Please\nrefer to References section for further information about this issue and\nthe performance impact. \n\nIn this update initial mitigations for IBM Power (PowerPC) and IBM zSeries\n(S390) architectures are provided. \n\nVariant CVE-2017-5753 triggers the speculative execution by performing a\nbounds-check bypass. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nand guest/host boundaries and read privileged memory by conducting targeted\ncache side-channel attacks. (CVE-2017-5715, Important, S390)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors,\nduring speculative execution of instruction permission faults, exception\ngeneration triggered by a faulting access is suppressed until the\nretirement of the whole instruction block. In a combination with the fact\nthat memory accesses may populate the cache even when the block is being\ndropped and never committed (executed), an unprivileged local attacker\ncould use this flaw to read privileged (kernel space) memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5754, Important, PowerPC)\n\nRed Hat would like to thank Google Project Zero for reporting these issues. \n\nBug Fix(es):\n\n* When attempting to reread parent blocks in btree traversal, the xfs code\nwhich deletes extended attributes from an inode assumed that the parent\nblocks were still on the cache. Under memory pressure and memory reclaim,\nsuch parent blocks were sometimes removed from the cache. Consequently,\nattempts to reread previously cached parent blocks caused the file system\nto read invalid memory. This update fixes xfs to reinitialize the pointer\nto the parent block buffers after the block has been reread. (BZ#1512811)\n\n* The write access check for huge pages did not function correctly on IBM z\nSystems. Consequently, if asynchronous I/O reads were used, buffers\nsometimes contained zeroes rather than data from a file, even when the\nio_getevents() system call reported that the associated read had finished\nsuccessfully. This update fixes the write access check in the\ngup_huge_pmd() function in memory management, and read data is stored in\nasynchronous I/O buffers properly. (BZ#1513315)\n\n* With this update, the rule for iptables reloading has been optimized to\ncomplete faster. (BZ#1514040)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass\n1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection\n1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling\n\n6. Package List:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3):\n\nSource:\nkernel-3.10.0-514.41.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-514.41.1.el7.noarch.rpm\nkernel-doc-3.10.0-514.41.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-devel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-headers-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-514.41.1.el7.x86_64.rpm\nperf-3.10.0-514.41.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-514.41.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.3):\n\nSource:\nkernel-3.10.0-514.41.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-514.41.1.el7.noarch.rpm\nkernel-doc-3.10.0-514.41.1.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debug-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-devel-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-headers-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-tools-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-514.41.1.el7.ppc64.rpm\nperf-3.10.0-514.41.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\npython-perf-3.10.0-514.41.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\n\nppc64le:\nkernel-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-514.41.1.el7.ppc64le.rpm\nperf-3.10.0-514.41.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\npython-perf-3.10.0-514.41.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-514.41.1.el7.s390x.rpm\nkernel-debug-3.10.0-514.41.1.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.s390x.rpm\nkernel-debug-devel-3.10.0-514.41.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-514.41.1.el7.s390x.rpm\nkernel-devel-3.10.0-514.41.1.el7.s390x.rpm\nkernel-headers-3.10.0-514.41.1.el7.s390x.rpm\nkernel-kdump-3.10.0-514.41.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-514.41.1.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-514.41.1.el7.s390x.rpm\nperf-3.10.0-514.41.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.s390x.rpm\npython-perf-3.10.0-514.41.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.s390x.rpm\n\nx86_64:\nkernel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-devel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-headers-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-514.41.1.el7.x86_64.rpm\nperf-3.10.0-514.41.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 7.3):\n\nppc64:\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-514.41.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-514.41.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-514.41.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/speculativeexecution\nhttps://access.redhat.com/security/cve/CVE-2017-5753\nhttps://access.redhat.com/security/cve/CVE-2017-5715\nhttps://access.redhat.com/security/cve/CVE-2017-5754\n\n8. Contact:\n\nThe Red Hat security contact is \[email protected]\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFaacZpXlSAg2UNWIIRAioFAJ9P+LP2qadmzmAR5WEaU5UvaOifqgCdFhO+\nFkImA43txPx8uAAK1eD546Y=\n=evDX\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\[email protected]\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n==========================================================================\nUbuntu Security Notice USN-3542-1\nJanuary 23, 2018\n\nlinux vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were addressed in the Linux kernel. This flaw is known as Spectre. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n linux-image-3.13.0-141-generic 3.13.0-141.190\n linux-image-3.13.0-141-lowlatency 3.13.0-141.190\n linux-image-generic 3.13.0.141.151\n linux-image-lowlatency 3.13.0.141.151\n\nPlease note that fully mitigating CVE-2017-5715 (Spectre Variant 2)\nrequires corresponding processor microcode/firmware updates or,\nin virtual environments, hypervisor updates. On i386 and amd64\narchitectures, the IBRS and IBPB features are required to enable the\nkernel mitigations. Ubuntu is working with Intel and AMD to provide\nfuture microcode updates that implement IBRS and IBPB as they are made\navailable. Ubuntu users with a processor from a different vendor should\ncontact the vendor to identify necessary firmware updates. Ubuntu\nwill provide corresponding QEMU updates in the future for users of\nself-hosted virtual environments in coordination with upstream QEMU. \nUbuntu users in cloud environments should contact the cloud provider\nto confirm that the hypervisor has been updated to expose the new\nCPU features to virtual machines. \n\nSoftware Description:\n- firefox: Mozilla Open Source web browser\n\nDetails:\n\nIt was discovered that speculative execution performed by modern CPUs\ncould leak information through a timing side-channel attack, and that\nthis could be exploited in web browser JavaScript engines. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to obtain sensitive information from other\ndomains, bypassing same-origin restrictions. (CVE-2017-5715,\nCVE-2017-5753, CVE-2017-5754). 7.2) - noarch, x86_64\n\n3. \n\nIn this update mitigations for x86-64 architecture are provided. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://softwaresupport.hpe.com/document/-/facetsearch/document/KM03158629\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: KM03158629\nVersion: 2\n\nMFSBGN03802 - Virtualization Performance Viewer (vPV) / Cloud Optimizer,\nLocal Disclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2018-05-11\nLast Updated: 2018-05-10\n\nPotential Security Impact: Local: Disclosure of Information\n\nSource: Micro Focus, Product Security Response Team\n\nVULNERABILITY SUMMARY\nA potential vulnerability has been identified in 3rd party component used by\nMicro Focus Virtualization Performance Viewer (vPV) / Cloud Optimizer Virtual\nAppliance. \n\nReferences:\n\n - CVE-2017-5753\n - CVE-2017-5715\n - CVE-2017-5754\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\n - HP Virtualization Performance Viewer Software - v2.20, v3.0, v3.01,\nv3.02, v3.03\n - HPE Cloud Optimizer - v2.20, v3.0, v3.01, v3.02, v3.03\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n\nRESOLUTION\n\nMicro Focus is actively working with its vendors to address any systems-level\nSpectre and Meltdown impacts.However, if you have immediate concerns or\nquestions regarding CentOS and its approach to Spectre or Meltdown, please\ncontact them directly. \n\nHISTORY\n\nVersion:1 (rev.1) - 12 April 2018 Initial release\n\nVersion:2 (rev.2) - 10 May 2018 Vulnerability Summary\n\n\nThird Party Security Patches: Third party security patches that are to be installed on \nsystems running Micro Focus products should be applied in accordance with the customer\u0027s \npatch management policy. \n\nSupport: For issues about implementing the recommendations of this Security Bulletin, contact normal Micro Focus services support channel. \nFor other issues about the content of this Security Bulletin, send e-mail to [email protected]. \n\nReport: To report a potential security vulnerability for any supported product:\n Web form: https://www.microfocus.com/support-and-services/report-security\n Email: [email protected]\n\nSubscribe:\n To initiate receiving subscriptions for future Micro Focus Security Bulletin alerts via Email, please subscribe here - https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification\n Once you are logged in to the portal, please choose security bulletins under product and document types. \n Please note that you will need to sign in using a Passport account. If you do not have a Passport account yet, you can create one- its free and easy https://cf.passport.softwaregrp.com/hppcf/createuser.do \n\nSecurity Bulletin Archive:\n A list of recently released Security Bulletins is available here: https://softwaresupport.hpe.com/security-vulnerability\n \nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following Micro Focus Security Bulletin. \n\n3P = 3rd Party Software\nGN = Micro Focus General Software\nMU = Multi-Platform Software\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. \nMicro Focus is continually reviewing and enhancing the security features of software products to provide \ncustomers with current secure solutions. \n\n\"Micro Focus is broadly distributing this Security Bulletin in order to bring to the attention of users of the \naffected Micro Focus products the important security information contained in this Bulletin. Micro Focus recommends \nthat all users determine the applicability of this information to their individual situations and take appropriate action. \nMicro Focus does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, \nMicro Focus will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in \nthis Security Bulletin. To the extent permitted by law, Micro Focus disclaims all warranties, either express or \nimplied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\" \n\n\nCopyright 2017 EntIT Software LLC\n\nMicro Focus shall not be liable for technical or editorial errors or omissions contained herein. \nThe information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, \nneither Micro Focus nor its affiliates, subcontractors or suppliers will be liable for incidental, special \nor consequential damages including downtime cost; lost profits; damages relating to the procurement of \nsubstitute products or services; or damages for loss of data, or software restoration. \nThe information in this document is subject to change without notice. Micro Focus and the names of \nMicro Focus products referenced herein are trademarks of Micro Focus in the United States and other countries. \nOther product and company names mentioned herein may be trademarks of their respective owners", "sources": [ { "db": "NVD", "id": "CVE-2017-5753" }, { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" }, { "db": "PACKETSTORM", "id": "147454" }, { "db": "PACKETSTORM", "id": "145719" }, { "db": "PACKETSTORM", "id": "145768" }, { "db": "PACKETSTORM", "id": "147451" }, { "db": "PACKETSTORM", "id": "145801" }, { "db": "PACKETSTORM", "id": "146090" }, { "db": "PACKETSTORM", "id": "145655" }, { "db": "PACKETSTORM", "id": "146016" }, { "db": "PACKETSTORM", "id": "145715" }, { "db": "PACKETSTORM", "id": "145635" }, { "db": "PACKETSTORM", "id": "147582" }, { "db": "PACKETSTORM", "id": "145774" } ], "trust": 3.42 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-113956", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=43427", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5753", "trust": 3.0 }, { "db": "CERT/CC", "id": "VU#584653", "trust": 2.0 }, { "db": "CERT/CC", "id": "VU#180049", "trust": 2.0 }, { "db": "BID", "id": "102371", "trust": 1.8 }, { "db": "SECTRACK", "id": "1040071", "trust": 1.2 }, { "db": "SIEMENS", "id": "SSA-505225", "trust": 1.2 }, { "db": "SIEMENS", "id": "SSA-608355", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "145645", "trust": 1.2 }, { "db": "LENOVO", "id": "LEN-18282", "trust": 1.2 }, { "db": "EXPLOIT-DB", "id": "43427", "trust": 1.2 }, { "db": "CERT@VDE", "id": "VDE-2018-003", "trust": 1.2 }, { "db": "CERT@VDE", "id": "VDE-2018-002", "trust": 1.2 }, { "db": "USCERT", "id": "TA18-141A", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-00304", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "145774", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "145715", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "145837", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150863", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-201801-150", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-113956", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-5753", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147454", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145719", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145768", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147451", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145801", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146090", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145655", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146016", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145635", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147582", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" }, { "db": "PACKETSTORM", "id": "147454" }, { "db": "PACKETSTORM", "id": "145719" }, { "db": "PACKETSTORM", "id": "145768" }, { "db": "PACKETSTORM", "id": "147451" }, { "db": "PACKETSTORM", "id": "145774" }, { "db": "PACKETSTORM", "id": "145801" }, { "db": "PACKETSTORM", "id": "146090" }, { "db": "PACKETSTORM", "id": "145655" }, { "db": "PACKETSTORM", "id": "146016" }, { "db": "PACKETSTORM", "id": "145715" }, { "db": "PACKETSTORM", "id": "145635" }, { "db": "PACKETSTORM", "id": "147582" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "id": "VAR-201801-1712", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" } ], "trust": 1.32920724375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00304" } ] }, "last_update_date": "2024-11-29T22:02:02.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/07/26/netspectre_network_leak/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/05/21/spectre_meltdown_v4_microsoft_google/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/04/19/oracle_whips_out_the_swatter_squishes_254_security_bugs/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/01/15/meltdown_ics/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/01/08/meltdown_fix_security_problems/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/01/06/qualcomm_processor_security_vulnerabilities/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/01/04/microsoft_windows_patch_meltdown/" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180182 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180011 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180009 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180464 - Security Advisory" }, { "title": "Ubuntu Security Notice: nvidia-graphics-drivers-384 vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3521-1" }, { "title": "Red Hat: Important: Red Hat CloudForms 4.5 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180091 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180292 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180022 - Security Advisory" }, { "title": "Red Hat: Important: redhat-virtualization-host security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180047 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180018 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180007 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180008 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180496 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180016 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180512 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180021 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180017 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180020 - Security Advisory" }, { "title": "Red Hat: Important: rhvm-appliance security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180045 - Security Advisory" }, { "title": "Red Hat: Important: rhev-hypervisor7 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180046 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180010 - Security Advisory" }, { "title": "Red Hat: Important: redhat-virtualization-host security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180044 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3580-1" }, { "title": "Ubuntu Security Notice: linux, linux-raspi2 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3597-1" }, { "title": "Red Hat: Important: Red Hat CloudForms 4.2 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180090 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat CloudForms 4.1 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180089 - Security Advisory" }, { "title": "Ubuntu Security Notice: webkit2gtk vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3530-1" }, { "title": "Ubuntu Security Notice: linux-kvm vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3549-1" }, { "title": "Red Hat: Important: Red Hat CloudForms 4.0 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180092 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux-lts-trusty vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3542-2" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3542-1" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180151 - Security Advisory" }, { "title": "Red Hat: CVE-2017-5753", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2017-5753" }, { "title": "Ubuntu Security Notice: firefox vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3516-1" }, { "title": "Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3541-2" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-euclid vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3540-1" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3541-1" }, { "title": "Ubuntu Security Notice: linux-hwe vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3597-2" }, { "title": "Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3540-2" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=636e29cbaae925d0974090b2b35e61f3" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=02db86ca4e3ec4d5811922170929d798" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-5753" }, { "title": "Debian CVElist Bug Report Logs: wireshark: CVE-2017-17935: Denial of service in the File_read_line function in epan/wslua/wslua_file.c", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5a7f947350ad7e4fe0bbe84582a1c0a2" }, { "title": "Spectre-Vulnerability-CVE-2017-5753-", "trust": 0.1, "url": "https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753- " }, { "title": "cve-2017-5753", "trust": 0.1, "url": "https://github.com/xsscx/cve-2017-5753 " }, { "title": "525Final", "trust": 0.1, "url": "https://github.com/nhodges78/525Final " }, { "title": "Windows-Spectre-Meltdown-Mitigations", "trust": 0.1, "url": "https://github.com/m8urnett/Windows-Spectre-Meltdown-Mitigations " }, { "title": "spectre-cpu-pinning", "trust": 0.1, "url": "https://github.com/hayannoon/spectre-cpu-pinning " }, { "title": "spectre", "trust": 0.1, "url": "https://github.com/raul23/spectre " }, { "title": "awesome-stars", "trust": 0.1, "url": "https://github.com/igaozp/awesome-stars " }, { "title": "linux-exploit", "trust": 0.1, "url": "https://github.com/C0dak/linux-exploit " }, { "title": "spectre-attack", "trust": 0.1, "url": "https://github.com/Eugnis/spectre-attack " }, { "title": "mode-switch-stat", "trust": 0.1, "url": "https://github.com/eecheng87/mode-switch-stat " }, { "title": "Meltdown-Spectre", "trust": 0.1, "url": "https://github.com/jungp0/Meltdown-Spectre " }, { "title": "deep_spectre", "trust": 0.1, "url": "https://github.com/asm/deep_spectre " }, { "title": "spectreScope", "trust": 0.1, "url": "https://github.com/ixtal23/spectreScope " }, { "title": "spectre---attack", "trust": 0.1, "url": "https://github.com/lovesec/spectre---attack " }, { "title": "Spectre-PoC", "trust": 0.1, "url": "https://github.com/chaitanyarahalkar/Spectre-POC " }, { "title": "spectre", "trust": 0.1, "url": "https://github.com/6869736572/spectre " }, { "title": "spectre-attack-example", "trust": 0.1, "url": "https://github.com/poilynx/spectre-attack-example " }, { "title": "sidecheck", "trust": 0.1, "url": "https://github.com/radius314/sidecheck " }, { "title": "selfModify", "trust": 0.1, "url": "https://github.com/chuangshizhiqiang/selfModify " }, { "title": "linux-exploit", "trust": 0.1, "url": "https://github.com/jinb-park/linux-exploit " }, { "title": "spectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/compris-com/spectre-meltdown-checker " }, { "title": "sec", "trust": 0.1, "url": "https://github.com/6869736572/sec " }, { "title": "MeltdownSpectre", "trust": 0.1, "url": "https://github.com/Saiprasad16/MeltdownSpectre " }, { "title": "CiscoSpectreTakeover", "trust": 0.1, "url": "https://github.com/GarnetSunset/CiscoSpectreTakeover " }, { "title": "SpeculativeExecutionAssessment", "trust": 0.1, "url": "https://github.com/GregAskew/SpeculativeExecutionAssessment " }, { "title": "meltdownspectre-patches", "trust": 0.1, "url": "https://github.com/hannob/meltdownspectre-patches " }, { "title": "ansible-role-server-update-reboot", "trust": 0.1, "url": "https://github.com/abouchelliga707/ansible-role-server-update-reboot " }, { "title": "yum-update", "trust": 0.1, "url": "https://github.com/bhanukana/yum-update " }, { "title": "Ansible", "trust": 0.1, "url": "https://github.com/xxkiroxx/Ansible " }, { "title": "MeltdownSpectreReport", "trust": 0.1, "url": "https://github.com/vrdse/MeltdownSpectreReport " }, { "title": "ansible-prometheus-node-exporter", "trust": 0.1, "url": "https://github.com/CyVerse-Ansible/ansible-prometheus-node-exporter " }, { "title": "docker-spectre", "trust": 0.1, "url": "https://github.com/feffi/docker-spectre " }, { "title": "check-spectre-meltdown-ansible", "trust": 0.1, "url": "https://github.com/mbruzek/check-spectre-meltdown-ansible " }, { "title": "meltdown-spectre", "trust": 0.1, "url": "https://github.com/v-lavrentikov/meltdown-spectre " }, { "title": "meltdown", "trust": 0.1, "url": "https://github.com/v-lavrentikov/meltdown " }, { "title": "meltdown-spectre-bios-list", "trust": 0.1, "url": "https://github.com/mathse/meltdown-spectre-bios-list " }, { "title": "HWFW", "trust": 0.1, "url": "https://github.com/danswinus/HWFW " }, { "title": "spectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/mjaggi-cavium/spectre-meltdown-checker " }, { "title": "cpu-report", "trust": 0.1, "url": "https://github.com/rosenbergj/cpu-report " }, { "title": "SpecuCheck", "trust": 0.1, "url": "https://github.com/ionescu007/SpecuCheck " }, { "title": "TEApot", "trust": 0.1, "url": "https://github.com/github-3rr0r/TEApot " }, { "title": "TEApot", "trust": 0.1, "url": "https://github.com/Mashiro1995/TEApot " }, { "title": "specter---meltdown--checker", "trust": 0.1, "url": "https://github.com/vurtne/specter---meltdown--checker " }, { "title": "Awesome-C", "trust": 0.1, "url": "https://github.com/pathakabhi24/Awesome-C " }, { "title": "awesome-c", "trust": 0.1, "url": "https://github.com/uhub/awesome-c " }, { "title": "spectre-meltdown", "trust": 0.1, "url": "https://github.com/edsonjt81/spectre-meltdown " }, { "title": "spectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/speed47/spectre-meltdown-checker " }, { "title": "Windows-Spectre-Meltdown-Mitigation-Script", "trust": 0.1, "url": "https://github.com/simeononsecurity/Windows-Spectre-Meltdown-Mitigation-Script " }, { "title": "Windows-Specture-Meltdown-Mitigation-Script", "trust": 0.1, "url": "https://github.com/simeononsecurity/Windows-Specture-Meltdown-Mitigation-Script " }, { "title": "Deep-Security-Reports", "trust": 0.1, "url": "https://github.com/OzNetNerd/Deep-Security-Reports " }, { "title": "Hardware-and-Firmware-Security-Guidance", "trust": 0.1, "url": "https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance " }, { "title": "cSpeculationControlFixes", "trust": 0.1, "url": "https://github.com/poshsecurity/cSpeculationControlFixes " }, { "title": "puppet-meltdown", "trust": 0.1, "url": "https://github.com/timidri/puppet-meltdown " }, { "title": "Linux-Tools", "trust": 0.1, "url": "https://github.com/minutesinch/Linux-Tools " }, { "title": "Firmware-Security", "trust": 0.1, "url": "https://github.com/virusbeeE/Firmware-Security " }, { "title": "hardware-attacks-state-of-the-art", "trust": 0.1, "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art " }, { "title": "reverse-engineering-toolkit", "trust": 0.1, "url": "https://github.com/geeksniper/reverse-engineering-toolkit " }, { "title": "ansible-everyday", "trust": 0.1, "url": "https://github.com/kaosagnt/ansible-everyday " }, { "title": "C-libraries", "trust": 0.1, "url": "https://github.com/ambynotcoder/C-libraries " }, { "title": "poc--exp", "trust": 0.1, "url": "https://github.com/HacTF/poc--exp " }, { "title": "poc-exp", "trust": 0.1, "url": "https://github.com/msr00t/poc-exp " }, { "title": "Exp101tsArchiv30thers", "trust": 0.1, "url": "https://github.com/nu11secur1ty/Exp101tsArchiv30thers " }, { "title": "awesome-cve-poc_qazbnm456", "trust": 0.1, "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 " }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/working-windows-and-linux-spectre-exploits-found-on-virustotal/" }, { "title": "Securelist", "trust": 0.1, "url": "https://securelist.com/kaspersky-security-bulletin-2018-top-security-stories/89118/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/new-netspectre-attack-can-steal-cpu-secrets-via-network-connections/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/academics-announce-new-protections-against-spectre-and-rowhammer-attacks/" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2018/06/16/speculative_execution_spectre_meltdown/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/google-and-microsoft-reveal-new-spectre-attack/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/new-spectre-attack-recovers-data-from-a-cpus-protected-smm-mode/" }, { "title": "Securelist", "trust": 0.1, "url": "https://securelist.com/it-threat-evolution-q1-2018/85469/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/new-microsoft-bug-bounty-program-looks-to-squash-the-next-spectre-meltdown/130523/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/hardware/here-we-go-again-intel-releases-updated-spectre-patches/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/we-may-soon-see-malware-leveraging-the-meltdown-and-spectre-vulnerabilities/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/apple/apple-backports-meltdown-patch-to-older-macos-versions/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/hardware/hp-reissuing-bios-updates-after-buggy-intel-meltdown-and-spectre-updates/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/red-hat-will-revert-spectre-patches-after-receiving-reports-of-boot-issues/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/apple-releases-spectre-patches-for-safari-macos-and-ios/129365/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/apple/apple-releases-security-updates-for-spectre-cpu-flaw/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/experts-weigh-in-on-spectre-patch-challenges/129337/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/vendors-share-patch-updates-on-spectre-and-meltdown-mitigation-efforts/129307/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/google-almost-all-cpus-since-1995-vulnerable-to-meltdown-and-spectre-flaws/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/google-shares-spectre-poc-targeting-browser-javascript-engines/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-5753" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-203", "trust": 1.1 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-113956" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "trust": 2.0, "url": "http://www.kb.cert.org/vuls/id/584653" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/102371" }, { "trust": 1.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "trust": 1.6, "url": "https://support.apple.com//ht208394" }, { "trust": 1.6, "url": "http://www.dell.com/support/speculative-store-bypass" }, { "trust": 1.6, "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "trust": 1.3, "url": "https://www.exploit-db.com/exploits/43427/" }, { "trust": 1.2, "url": "https://seclists.org/bugtraq/2019/jun/36" }, { "trust": 1.2, "url": "https://www.kb.cert.org/vuls/id/180049" }, { "trust": 1.2, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180104-cpusidechannel" }, { "trust": 1.2, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "trust": 1.2, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "trust": 1.2, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "trust": 1.2, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "trust": 1.2, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2018-001.txt" }, { "trust": 1.2, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt" }, { "trust": 1.2, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "trust": 1.2, "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "trust": 1.2, "url": "https://aws.amazon.com/de/security/security-bulletins/aws-2018-013/" }, { "trust": 1.2, "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "trust": 1.2, "url": "https://cdrdv2.intel.com/v1/dl/getcontent/685359" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "trust": 1.2, "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "trust": 1.2, "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "trust": 1.2, "url": "https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes" }, { "trust": 1.2, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180002" }, { "trust": 1.2, "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "trust": 1.2, "url": "https://support.citrix.com/article/ctx231399" }, { "trust": 1.2, "url": "https://support.f5.com/csp/article/k91229003" }, { "trust": 1.2, "url": "https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us" }, { "trust": 1.2, "url": "https://support.lenovo.com/us/en/solutions/len-18282" }, { "trust": 1.2, "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "trust": 1.2, "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "trust": 1.2, "url": "https://www.synology.com/support/security/synology_sa_18_01" }, { "trust": 1.2, "url": "https://www.vmware.com/us/security/advisories/vmsa-2018-0002.html" }, { "trust": 1.2, "url": "https://www.debian.org/security/2018/dsa-4187" }, { "trust": 1.2, "url": "https://www.debian.org/security/2018/dsa-4188" }, { "trust": 1.2, "url": "https://security.gentoo.org/glsa/201810-06" }, { "trust": 1.2, "url": "http://packetstormsecurity.com/files/145645/spectre-information-disclosure-proof-of-concept.html" }, { "trust": 1.2, "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "trust": 1.2, "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "trust": 1.2, "url": "https://spectreattack.com/" }, { "trust": 1.2, "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:0292" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1040071" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3540-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3540-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3541-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3541-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3542-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3542-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3549-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3580-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3597-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3597-2/" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03871en_us" }, { "trust": 0.8, "url": "https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution" }, { "trust": 0.8, "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "trust": 0.8, "url": "https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ncas/alerts/ta18-141a" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/208.html" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf" }, { "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel" }, { "trust": 0.8, "url": "https://fortiguard.com/psirt/fg-ir-18-002" }, { "trust": 0.8, "url": "https://support.hp.com/us-en/document/c06001626" }, { "trust": 0.8, "url": "http://www.hitachi.com/hirt/publications/hirt-pub18001/" }, { "trust": 0.8, "url": "https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/" }, { "trust": 0.8, "url": "https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution" }, { "trust": 0.8, "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "trust": 0.8, "url": "https://www.suse.com/support/kb/doc/?id=7022937" }, { "trust": 0.8, "url": "https://www.synology.com/en-global/support/security/synology_sa_18_23" }, { "trust": 0.8, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/variant4" }, { "trust": 0.8, "url": "https://kb.vmware.com/s/article/54951" }, { "trust": 0.8, "url": "https://aws.amazon.com/security/security-bulletins/aws-2018-015/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5753" }, { "trust": 0.6, "url": "https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5715" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2017-5753" }, { "trust": 0.4, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2017-5754" }, { "trust": 0.4, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2017-5715" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://access.redhat.com/errata/rhsa-2018:0182" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5803" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18241" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1066" }, { "trust": 0.2, "url": "https://security-tracker.debian.org/tracker/linux" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1068" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000199" }, { "trust": 0.2, "url": "https://www.debian.org/security/faq" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1092" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18216" }, { "trust": 0.2, "url": "https://www.debian.org/security/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5754" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03871en_us" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/203.html" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/3521-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=58431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10323" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7757" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1093" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7566" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18224" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7740" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18218" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8087" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18193" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17975" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8822" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1108" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1065" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8781" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7480" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7995" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18257" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0044" }, { "trust": 0.1, "url": "https://access.redhat.com/solutions/3307851" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16911" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-6927" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13166" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-9016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5750" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18232" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5332" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-0861" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16914" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16526" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16913" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13220" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16912" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18203" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000004" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-384/384.111-0ubuntu0.17.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-384/384.111-0ubuntu0.17.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-384/384.111-0ubuntu0.14.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-384/384.111-0ubuntu0.16.04.1" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3521-1" }, { "trust": 0.1, "url": "https://www.vmware.com/go/downloadfusion" }, { "trust": 0.1, "url": "https://www.vmware.com/support/pubs/fusion_pubs.html" }, { "trust": 0.1, "url": "https://twitter.com/vmwaresrc" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5753" }, { "trust": 0.1, "url": "https://blogs.vmware.com/security" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "https://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5715" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/52127" }, { "trust": 0.1, "url": "https://www.vmware.com/support/pubs/ws_pubs.html" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2151132" }, { "trust": 0.1, "url": "https://my.vmware.com/group/vmware/patch" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2151099" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/lifecycle.html" }, { "trust": 0.1, "url": "https://www.vmware.com/go/downloadworkstation" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0021" }, { "trust": 0.1, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/spectreandmeltdown" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/3.13.0-141.190" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3542-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/57.0.4+build1-0ubuntu0.14.04.1" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3516-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/57.0.4+build1-0ubuntu0.17.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/57.0.4+build1-0ubuntu0.16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/57.0.4+build1-0ubuntu0.17.04.1" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0010" }, { "trust": 0.1, "url": "https://www.microfocus.com/support-and-services/report-security" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification" }, { "trust": 0.1, "url": "https://cf.passport.softwaregrp.com/hppcf/createuser.do" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/security-vulnerability" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/document/-/facetsearch/document/km03158629" } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" }, { "db": "PACKETSTORM", "id": "147454" }, { "db": "PACKETSTORM", "id": "145719" }, { "db": "PACKETSTORM", "id": "145768" }, { "db": "PACKETSTORM", "id": "147451" }, { "db": "PACKETSTORM", "id": "145774" }, { "db": "PACKETSTORM", "id": "145801" }, { "db": "PACKETSTORM", "id": "146090" }, { "db": "PACKETSTORM", "id": "145655" }, { "db": "PACKETSTORM", "id": "146016" }, { "db": "PACKETSTORM", "id": "145715" }, { "db": "PACKETSTORM", "id": "145635" }, { "db": "PACKETSTORM", "id": "147582" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" }, { "db": "PACKETSTORM", "id": "147454" }, { "db": "PACKETSTORM", "id": "145719" }, { "db": "PACKETSTORM", "id": "145768" }, { "db": "PACKETSTORM", "id": "147451" }, { "db": "PACKETSTORM", "id": "145774" }, { "db": "PACKETSTORM", "id": "145801" }, { "db": "PACKETSTORM", "id": "146090" }, { "db": "PACKETSTORM", "id": "145655" }, { "db": "PACKETSTORM", "id": "146016" }, { "db": "PACKETSTORM", "id": "145715" }, { "db": "PACKETSTORM", "id": "145635" }, { "db": "PACKETSTORM", "id": "147582" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-21T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-01-04T00:00:00", "db": "CNVD", "id": "CNVD-2018-00304" }, { "date": "2018-01-04T00:00:00", "db": "VULHUB", "id": "VHN-113956" }, { "date": "2018-01-04T00:00:00", "db": "VULMON", "id": "CVE-2017-5753" }, { "date": "2018-05-03T01:35:46", "db": "PACKETSTORM", "id": "147454" }, { "date": "2018-01-06T18:01:12", "db": "PACKETSTORM", "id": "145719" }, { "date": "2018-01-09T17:21:50", "db": "PACKETSTORM", "id": "145768" }, { "date": "2018-05-03T01:31:56", "db": "PACKETSTORM", "id": "147451" }, { "date": "2018-01-09T17:32:51", "db": "PACKETSTORM", "id": "145774" }, { "date": "2018-01-10T01:01:35", "db": "PACKETSTORM", "id": "145801" }, { "date": "2018-01-25T21:43:32", "db": "PACKETSTORM", "id": "146090" }, { "date": "2018-01-04T17:51:43", "db": "PACKETSTORM", "id": "145655" }, { "date": "2018-01-23T04:32:03", "db": "PACKETSTORM", "id": "146016" }, { "date": "2018-01-06T18:00:39", "db": "PACKETSTORM", "id": "145715" }, { "date": "2018-01-04T00:52:58", "db": "PACKETSTORM", "id": "145635" }, { "date": "2018-05-10T23:27:00", "db": "PACKETSTORM", "id": "147582" }, { "date": "2018-01-04T13:29:00.257000", "db": "NVD", "id": "CVE-2017-5753" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-19T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-01-08T00:00:00", "db": "CNVD", "id": "CNVD-2018-00304" }, { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-113956" }, { "date": "2021-11-23T00:00:00", "db": "VULMON", "id": "CVE-2017-5753" }, { "date": "2024-11-21T03:28:19.097000", "db": "NVD", "id": "CVE-2017-5753" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "145774" }, { "db": "PACKETSTORM", "id": "146016" }, { "db": "PACKETSTORM", "id": "147582" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks", "sources": [ { "db": "CERT/CC", "id": "VU#180049" } ], "trust": 0.8 } }
var-201807-1677
Vulnerability from variot
Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces. plural Intel Xeon The product contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Xeon Scalable Processors and others are central processing unit (CPU) products of Intel Corporation of the United States. There are security vulnerabilities in the UEFI settings for DCI in several Intel products. An attacker can exploit the vulnerability to access sensitive information about the platform through the debug interface
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1677", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3808" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3850" }, { "model": "xeon", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "d-1531" }, { "model": "xeon", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "d-1529" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3958" }, { "model": "xeon", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "d-1528" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3950" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3830" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3955" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3858" }, { "model": "xeon e3 1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2538" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3308" }, { "model": "xeon e3 1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6154" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2142it" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130f" }, { "model": "xeon e3 1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2163it" }, { "model": "xeon e3 1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8158" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126t" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160t" }, { "model": "xeon e3 1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1545m_v5" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2750" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585l_v5" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2518" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3758" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1540" }, { "model": "xeon e3 1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3336" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1558l_v5" }, { "model": "xeon e3 1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4108" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2516" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1523n" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6152" }, { "model": "xeon e3 1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2308" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176m" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2141i" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134m" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4109t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2173it" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1518" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1553n" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126" }, { "model": "xeon e3 1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1578l_v5" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5119t" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5122" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v6" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3338" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8168" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2166nt" }, { "model": "xeon e3 1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8180" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6150" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1548" }, { "model": "xeon e3 1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2143it" }, { "model": "xeon e3 1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8164" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1533n" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1537" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138f" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2123it" }, { "model": "xeon e3 1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon bronze 3106", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1577" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2738" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1571" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2530" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2145nt" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2730" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1520" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2358" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1505m_v6" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2183it" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6146" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142f" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2550" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3750" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126f" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6136" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1515m_v5" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1557" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3708" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2177nt" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138p" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8156" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v5" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2350" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2758" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1513n" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585_v5" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6128" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120t" }, { "model": "xeon e3 1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1539" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2338" }, { "model": "xeon e3 1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2558" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3508" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1521" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1559" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8153" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5118" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3558" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2187nt" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1541" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5115" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2146nt" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176f" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1565l_v5" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1543n" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-2161i" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8180m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1567" }, { "model": "xeon e3 1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140" }, { "model": "xeon e3 1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114t" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120" }, { "model": "xeon e3 1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6144" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2316" }, { "model": "xeon bronze 3104", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148f" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3538" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "d-1527" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2718" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160f" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2508" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140m" }, { "model": "xeon e3 1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6132" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1575m_v5" }, { "model": "xeon", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon bronze", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon processor d family", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "atom processor c series", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v6" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v5" }, { "model": "xeon scalable processors", "scope": null, "trust": 0.6, "vendor": "intel", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15595" }, { "db": "JVNDB", "id": "JVNDB-2018-008008" }, { "db": "CNNVD", "id": "CNNVD-201807-892" }, { "db": "NVD", "id": "CVE-2018-3652" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon_e3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon_bronze", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon_gold", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon_platinum", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon_silver", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008008" } ] }, "cve": "CVE-2018-3652", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-3652", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-15595", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-133683", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2018-3652", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.6, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-3652", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2018-3652", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-3652", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2018-15595", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201807-892", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-133683", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-3652", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15595" }, { "db": "VULHUB", "id": "VHN-133683" }, { "db": "VULMON", "id": "CVE-2018-3652" }, { "db": "JVNDB", "id": "JVNDB-2018-008008" }, { "db": "CNNVD", "id": "CNNVD-201807-892" }, { "db": "NVD", "id": "CVE-2018-3652" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces. plural Intel Xeon The product contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Xeon Scalable Processors and others are central processing unit (CPU) products of Intel Corporation of the United States. There are security vulnerabilities in the UEFI settings for DCI in several Intel products. An attacker can exploit the vulnerability to access sensitive information about the platform through the debug interface", "sources": [ { "db": "NVD", "id": "CVE-2018-3652" }, { "db": "JVNDB", "id": "JVNDB-2018-008008" }, { "db": "CNVD", "id": "CNVD-2018-15595" }, { "db": "VULHUB", "id": "VHN-133683" }, { "db": "VULMON", "id": "CVE-2018-3652" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3652", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2018-008008", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-892", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-15595", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-23611", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-133683", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-3652", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15595" }, { "db": "VULHUB", "id": "VHN-133683" }, { "db": "VULMON", "id": "CVE-2018-3652" }, { "db": "JVNDB", "id": "JVNDB-2018-008008" }, { "db": "CNNVD", "id": "CNNVD-201807-892" }, { "db": "NVD", "id": "CVE-2018-3652" } ] }, "id": "VAR-201807-1677", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-15595" }, { "db": "VULHUB", "id": "VHN-133683" } ], "trust": 1.4727272666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15595" } ] }, "last_update_date": "2024-11-23T22:38:05.623000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00127", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/07/25/intel_xeon_usb_debugging/" }, { "title": "HP: HPSBHF03586 rev. 1 - DCI Policy Update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03586" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-3652" }, { "db": "JVNDB", "id": "JVNDB-2018-008008" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133683" }, { "db": "JVNDB", "id": "JVNDB-2018-008008" }, { "db": "NVD", "id": "CVE-2018-3652" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html" }, { "trust": 1.8, "url": "https://security.netapp.com/advisory/ntap-20180802-0001/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3652" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3652" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/solutions/len-23611" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.theregister.co.uk/2018/07/25/intel_xeon_usb_debugging/" }, { "trust": 0.1, "url": "https://support.hp.com/us-en/document/c06082722" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15595" }, { "db": "VULHUB", "id": "VHN-133683" }, { "db": "VULMON", "id": "CVE-2018-3652" }, { "db": "JVNDB", "id": "JVNDB-2018-008008" }, { "db": "CNNVD", "id": "CNNVD-201807-892" }, { "db": "NVD", "id": "CVE-2018-3652" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-15595" }, { "db": "VULHUB", "id": "VHN-133683" }, { "db": "VULMON", "id": "CVE-2018-3652" }, { "db": "JVNDB", "id": "JVNDB-2018-008008" }, { "db": "CNNVD", "id": "CNNVD-201807-892" }, { "db": "NVD", "id": "CVE-2018-3652" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-17T00:00:00", "db": "CNVD", "id": "CNVD-2018-15595" }, { "date": "2018-07-10T00:00:00", "db": "VULHUB", "id": "VHN-133683" }, { "date": "2018-07-10T00:00:00", "db": "VULMON", "id": "CVE-2018-3652" }, { "date": "2018-10-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008008" }, { "date": "2018-07-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-892" }, { "date": "2018-07-10T21:29:00.983000", "db": "NVD", "id": "CVE-2018-3652" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-17T00:00:00", "db": "CNVD", "id": "CNVD-2018-15595" }, { "date": "2020-04-28T00:00:00", "db": "VULHUB", "id": "VHN-133683" }, { "date": "2020-04-28T00:00:00", "db": "VULMON", "id": "CVE-2018-3652" }, { "date": "2018-10-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008008" }, { "date": "2019-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-892" }, { "date": "2024-11-21T04:05:50.563000", "db": "NVD", "id": "CVE-2018-3652" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-892" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Intel Xeon Vulnerabilities related to authorization, authority, and access control in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008008" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-892" } ], "trust": 0.6 } }
var-201906-0923
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security signature issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0923", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0180" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "cve": "CVE-2019-0180", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-0180", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140211", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2019-0180", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0180", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-572", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140211", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140211" }, { "db": "CNNVD", "id": "CNNVD-201906-572" }, { "db": "NVD", "id": "CVE-2019-0180" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security signature issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-0180" }, { "db": "VULHUB", "id": "VHN-140211" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0180", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-572", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140211", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140211" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-572" }, { "db": "NVD", "id": "CVE-2019-0180" } ] }, "id": "VAR-201906-0923", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140211" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T19:32:08.844000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140211" }, { "db": "NVD", "id": "CVE-2019-0180" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140211" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-572" }, { "db": "NVD", "id": "CVE-2019-0180" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140211" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-572" }, { "db": "NVD", "id": "CVE-2019-0180" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140211" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-572" }, { "date": "2019-06-13T16:29:01.107000", "db": "NVD", "id": "CVE-2019-0180" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140211" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-572" }, { "date": "2024-11-21T04:16:25.263000", "db": "NVD", "id": "CVE-2019-0180" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-572" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-572" } ], "trust": 0.6 } }
var-201906-1228
Vulnerability from variot
Improper permissions in the installer for Intel(R) Omni-Path Fabric Manager GUI before version 10.9.2.1.1 may allow an authenticated user to potentially enable escalation of privilege via local attack. Intel Omni-Path Fabric Manager GUI is prone to a local privilege-escalation vulnerability. A local attacker can exploit this issue to gain elevated privileges. Versions prior to Intel Omni-Path Fabric Manager GUI prior to 10.9.2.1.1 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1228", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "omni-path fabric manager gui", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "10.9.2.1.1" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.9.2.0.7" }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.9.0.0.208" }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.9.0.0.206" }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.7.0.0.145" }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.0.1.0.45" }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.0.0.0.691" }, { "model": "omni-path fabric manager gui", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "10.9.2.1.1" } ], "sources": [ { "db": "BID", "id": "108788" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11117" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marius Gabriel Mihai.", "sources": [ { "db": "BID", "id": "108788" }, { "db": "CNNVD", "id": "CNNVD-201906-576" } ], "trust": 0.9 }, "cve": "CVE-2019-11117", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11117", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142731", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-11117", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-11117", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-576", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-142731", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142731" }, { "db": "CNNVD", "id": "CNNVD-201906-576" }, { "db": "NVD", "id": "CVE-2019-11117" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permissions in the installer for Intel(R) Omni-Path Fabric Manager GUI before version 10.9.2.1.1 may allow an authenticated user to potentially enable escalation of privilege via local attack. Intel Omni-Path Fabric Manager GUI is prone to a local privilege-escalation vulnerability. \nA local attacker can exploit this issue to gain elevated privileges. \nVersions prior to Intel Omni-Path Fabric Manager GUI prior to 10.9.2.1.1 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2019-11117" }, { "db": "BID", "id": "108788" }, { "db": "VULHUB", "id": "VHN-142731" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11117", "trust": 2.8 }, { "db": "BID", "id": "108788", "trust": 2.0 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-576", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-18596", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-142731", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142731" }, { "db": "BID", "id": "108788" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-576" }, { "db": "NVD", "id": "CVE-2019-11117" } ] }, "id": "VAR-201906-1228", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142731" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T20:23:19.382000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel Omni-Path Fabric Manager GUI Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93798" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-576" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-275", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142731" }, { "db": "NVD", "id": "CVE-2019-11117" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/108788" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142731" }, { "db": "BID", "id": "108788" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-576" }, { "db": "NVD", "id": "CVE-2019-11117" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142731" }, { "db": "BID", "id": "108788" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-576" }, { "db": "NVD", "id": "CVE-2019-11117" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142731" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108788" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-576" }, { "date": "2019-06-13T16:29:01.293000", "db": "NVD", "id": "CVE-2019-11117" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-02T00:00:00", "db": "VULHUB", "id": "VHN-142731" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108788" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-576" }, { "date": "2024-11-21T04:20:33.943000", "db": "NVD", "id": "CVE-2019-11117" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108788" }, { "db": "CNNVD", "id": "CNNVD-201906-576" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-576" } ], "trust": 0.6 } }
var-201801-0826
Vulnerability from variot
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \"melts\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \"cross-border\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Intel Xeon CPU E5-1650 v3, v2, v4 versions; Xeon E3-1265l v2, v3, v4 Version; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. ========================================================================== Ubuntu Security Notice USN-3597-2 March 15, 2018
linux-hwe vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04 LTS.
USNS 3541-2 and 3523-2 provided mitigations for Spectre and Meltdown (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) for the i386, amd64, and ppc64el architectures for Ubuntu 16.04 LTS. This flaw is known as Meltdown. A local attacker could use this to expose sensitive information, including kernel memory. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. Relevant releases/architectures:
Image Updates for RHV-H - noarch
- These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Description:
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm package provides the user-space component for running virtual machines that use KVM. (CVE-2017-5715)
Note: This is the qemu-kvm side of the CVE-2017-5715 mitigation. Once all virtual machines have shut down, start them again for this update to take effect. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: linux-firmware security update Advisory ID: RHSA-2018:0094-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:0094 Issue date: 2018-01-16 =====================================================================
- Summary:
An update for linux-firmware is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch Red Hat Enterprise Linux ComputeNode (v. 7) - noarch Red Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Enterprise Linux Server AUS (v. 7.2) - noarch Red Hat Enterprise Linux Server E4S (v. 7.2) - noarch Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch Red Hat Enterprise Linux Server TUS (v. 7.2) - noarch Red Hat Enterprise Linux Workstation (v. 7) - noarch Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch
- Description:
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
This update supersedes microcode provided by Red Hat with the CVE-2017-5715 (aSpectrea) CPU branch injection vulnerability mitigation. (Historically, Red Hat has provided updated microcode, developed by our microprocessor partners, as a customer convenience.) Further testing has uncovered problems with the microcode provided along with the aSpectrea mitigation that could lead to system instabilities. As a result, Red Hat is providing an microcode update that reverts to the last known good microcode version dated before 03 January 2018. Red Hat strongly recommends that customers contact their hardware provider for the latest microcode updates.
IMPORTANT: Customers using Intel Skylake-, Broadwell-, and Haswell-based platforms must obtain and install updated microcode from their hardware vendor immediately. The "Spectre" mitigation requires both an updated kernel from Red Hat and updated microcode from your hardware vendor.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm
noarch: iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm
Red Hat Enterprise Linux ComputeNode EUS (v. 7.3):
Source: linux-firmware-20160830-51.git7534e19.el7_3.src.rpm
noarch: iwl100-firmware-39.31.5.1-51.el7_3.noarch.rpm iwl1000-firmware-39.31.5.1-51.el7_3.noarch.rpm iwl105-firmware-18.168.6.1-51.el7_3.noarch.rpm iwl135-firmware-18.168.6.1-51.el7_3.noarch.rpm iwl2000-firmware-18.168.6.1-51.el7_3.noarch.rpm iwl2030-firmware-18.168.6.1-51.el7_3.noarch.rpm iwl3160-firmware-22.0.7.0-51.el7_3.noarch.rpm iwl3945-firmware-15.32.2.9-51.el7_3.noarch.rpm iwl4965-firmware-228.61.2.24-51.el7_3.noarch.rpm iwl5000-firmware-8.83.5.1_1-51.el7_3.noarch.rpm iwl5150-firmware-8.24.2.2-51.el7_3.noarch.rpm iwl6000-firmware-9.221.4.1-51.el7_3.noarch.rpm iwl6000g2a-firmware-17.168.5.3-51.el7_3.noarch.rpm iwl6000g2b-firmware-17.168.5.2-51.el7_3.noarch.rpm iwl6050-firmware-41.28.5.1-51.el7_3.noarch.rpm iwl7260-firmware-22.0.7.0-51.el7_3.noarch.rpm iwl7265-firmware-22.0.7.0-51.el7_3.noarch.rpm linux-firmware-20160830-51.git7534e19.el7_3.noarch.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm
noarch: iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm
Red Hat Enterprise Linux Server AUS (v. 7.2):
Source: linux-firmware-20150904-45.git6ebf5d5.el7_2.src.rpm
noarch: iwl100-firmware-39.31.5.1-45.el7_2.noarch.rpm iwl1000-firmware-39.31.5.1-45.el7_2.noarch.rpm iwl105-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl135-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl2000-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl2030-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl3160-firmware-22.0.7.0-45.el7_2.noarch.rpm iwl3945-firmware-15.32.2.9-45.el7_2.noarch.rpm iwl4965-firmware-228.61.2.24-45.el7_2.noarch.rpm iwl5000-firmware-8.83.5.1_1-45.el7_2.noarch.rpm iwl5150-firmware-8.24.2.2-45.el7_2.noarch.rpm iwl6000-firmware-9.221.4.1-45.el7_2.noarch.rpm iwl6000g2a-firmware-17.168.5.3-45.el7_2.noarch.rpm iwl6000g2b-firmware-17.168.5.2-45.el7_2.noarch.rpm iwl6050-firmware-41.28.5.1-45.el7_2.noarch.rpm iwl7260-firmware-22.0.7.0-45.el7_2.noarch.rpm iwl7265-firmware-22.0.7.0-45.el7_2.noarch.rpm linux-firmware-20150904-45.git6ebf5d5.el7_2.noarch.rpm
Red Hat Enterprise Linux Server E4S (v. 7.2):
Source: linux-firmware-20150904-45.git6ebf5d5.el7_2.src.rpm
noarch: iwl100-firmware-39.31.5.1-45.el7_2.noarch.rpm iwl1000-firmware-39.31.5.1-45.el7_2.noarch.rpm iwl105-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl135-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl2000-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl2030-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl3160-firmware-22.0.7.0-45.el7_2.noarch.rpm iwl3945-firmware-15.32.2.9-45.el7_2.noarch.rpm iwl4965-firmware-228.61.2.24-45.el7_2.noarch.rpm iwl5000-firmware-8.83.5.1_1-45.el7_2.noarch.rpm iwl5150-firmware-8.24.2.2-45.el7_2.noarch.rpm iwl6000-firmware-9.221.4.1-45.el7_2.noarch.rpm iwl6000g2a-firmware-17.168.5.3-45.el7_2.noarch.rpm iwl6000g2b-firmware-17.168.5.2-45.el7_2.noarch.rpm iwl6050-firmware-41.28.5.1-45.el7_2.noarch.rpm iwl7260-firmware-22.0.7.0-45.el7_2.noarch.rpm iwl7265-firmware-22.0.7.0-45.el7_2.noarch.rpm linux-firmware-20150904-45.git6ebf5d5.el7_2.noarch.rpm
Red Hat Enterprise Linux Server TUS (v. 7.2):
Source: linux-firmware-20150904-45.git6ebf5d5.el7_2.src.rpm
noarch: iwl100-firmware-39.31.5.1-45.el7_2.noarch.rpm iwl1000-firmware-39.31.5.1-45.el7_2.noarch.rpm iwl105-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl135-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl2000-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl2030-firmware-18.168.6.1-45.el7_2.noarch.rpm iwl3160-firmware-22.0.7.0-45.el7_2.noarch.rpm iwl3945-firmware-15.32.2.9-45.el7_2.noarch.rpm iwl4965-firmware-228.61.2.24-45.el7_2.noarch.rpm iwl5000-firmware-8.83.5.1_1-45.el7_2.noarch.rpm iwl5150-firmware-8.24.2.2-45.el7_2.noarch.rpm iwl6000-firmware-9.221.4.1-45.el7_2.noarch.rpm iwl6000g2a-firmware-17.168.5.3-45.el7_2.noarch.rpm iwl6000g2b-firmware-17.168.5.2-45.el7_2.noarch.rpm iwl6050-firmware-41.28.5.1-45.el7_2.noarch.rpm iwl7260-firmware-22.0.7.0-45.el7_2.noarch.rpm iwl7265-firmware-22.0.7.0-45.el7_2.noarch.rpm linux-firmware-20150904-45.git6ebf5d5.el7_2.noarch.rpm
Red Hat Enterprise Linux Server EUS (v. 7.3):
Source: linux-firmware-20160830-51.git7534e19.el7_3.src.rpm
noarch: iwl100-firmware-39.31.5.1-51.el7_3.noarch.rpm iwl1000-firmware-39.31.5.1-51.el7_3.noarch.rpm iwl105-firmware-18.168.6.1-51.el7_3.noarch.rpm iwl135-firmware-18.168.6.1-51.el7_3.noarch.rpm iwl2000-firmware-18.168.6.1-51.el7_3.noarch.rpm iwl2030-firmware-18.168.6.1-51.el7_3.noarch.rpm iwl3160-firmware-22.0.7.0-51.el7_3.noarch.rpm iwl3945-firmware-15.32.2.9-51.el7_3.noarch.rpm iwl4965-firmware-228.61.2.24-51.el7_3.noarch.rpm iwl5000-firmware-8.83.5.1_1-51.el7_3.noarch.rpm iwl5150-firmware-8.24.2.2-51.el7_3.noarch.rpm iwl6000-firmware-9.221.4.1-51.el7_3.noarch.rpm iwl6000g2a-firmware-17.168.5.3-51.el7_3.noarch.rpm iwl6000g2b-firmware-17.168.5.2-51.el7_3.noarch.rpm iwl6050-firmware-41.28.5.1-51.el7_3.noarch.rpm iwl7260-firmware-22.0.7.0-51.el7_3.noarch.rpm iwl7265-firmware-22.0.7.0-51.el7_3.noarch.rpm linux-firmware-20160830-51.git7534e19.el7_3.noarch.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm
noarch: iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source: linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm
noarch: iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm
noarch: iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/speculativeexecution https://access.redhat.com/security/cve/CVE-2017-5715
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFaXncBXlSAg2UNWIIRAtYfAKCfEHxjgLYls9QYIF/FrJPQWAu5mgCgkwVp auhGTN4XjBc6+TS+7HEUZvA= =zRtn -----END PGP SIGNATURE-----
-- RHSA-announce mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03805en_us Version: 4
HPESBHF03805 rev.4 - Certain HPE products using Microprocessors from Intel, AMD, and ARM, with Speculative Execution, Elevation of Privilege and Information Disclosure.
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2018-01-10 Last Updated: 2018-01-09
Potential Security Impact: Local: Disclosure of Information, Elevation of Privilege
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY On January 3 2018, side-channel security vulnerabilities involving speculative execution were publicly disclosed. These vulnerabilities may impact the listed HPE products, potentially leading to information disclosure and elevation of privilege. Mitigation and resolution of these vulnerabilities may call for both an operating system update, provided by the OS vendor, and a system ROM update from HPE.
Note:
- This issue takes advantage of techniques commonly used in many modern processor architectures.
-
For further information, microprocessor vendors have provided security advisories:
References:
- PSRT110634
- PSRT110633
- PSRT110632
- CVE-2017-5715 - aka Spectre, branch target injection
- CVE-2017-5753 - aka Spectre, bounds check bypass
- CVE-2017-5754 - aka Meltdown, rogue data cache load, memory access permission check performed after kernel memory read
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HPE ProLiant DL380 Gen10 Server prior to v1.28
- HPE ProLiant DL180 Gen10 Server prior to v1.28
- HPE ProLiant DL160 Gen10 Server prior to v1.28
- HPE ProLiant DL360 Gen10 Server prior to v1.28
- HPE ProLiant ML110 Gen10 Server prior to v1.28
- HPE ProLiant DL580 Gen10 Server prior to v1.28
- HPE ProLiant DL560 Gen10 Server prior to v1.28
- HPE ProLiant DL120 Gen10 Server prior to v1.28
- HPE ProLiant ML350 Gen10 Server prior to v1.28
- HPE ProLiant XL450 Gen10 Server prior to v1.28
- HPE ProLiant XL170r Gen10 Server prior to v1.28
- HPE ProLiant BL460c Gen10 Server Blade prior to v1.28
- HPE ProLiant XL230a Gen9 Server prior to v2.54
- HPE ProLiant XL230k Gen10 Server prior to v1.28
- HPE ProLiant XL730f Gen9 Server prior to v2.54
- HPE ProLiant XL740f Gen9 Server prior to v2.54
- HPE ProLiant XL750f Gen9 Server prior to v2.54
- HPE ProLiant XL170r Gen9 Server prior to v2.54
- HP ProLiant DL60 Gen9 Server prior to v2.54
- HPE ProLiant XL450 Gen9 Server prior to v2.54
- HP ProLiant DL160 Gen9 Server prior to v2.54
- HPE Apollo 4200 Gen9 Server prior to v2.54
- HP ProLiant BL460c Gen9 Server Blade prior to v2.54
- HP ProLiant ML110 Gen9 Server prior to v2.54
- HP ProLiant ML150 Gen9 Server prior to v2.54
- HPE ProLiant ML350 Gen9 Server prior to v2.54
- HP ProLiant DL380 Gen9 Server prior to v2.54
- HP ProLiant DL120 Gen9 Server prior to v2.54
- HPE ProLiant DL560 Gen9 Server prior to v2.54
- HPE ProLiant XL270d Gen9 Special Server prior to v2.54
- HP ProLiant BL660c Gen9 Server prior to v2.54
- HPE ProLiant m710x Server Cartridge prior to v1.60
- HPE ProLiant DL20 Gen9 Server prior to v2.52
- HPE ProLiant DL385 Gen10 Server prior to v1.04
- HPE Synergy 660 Gen9 Compute Module prior to v2.54
- HPE Synergy 480 Gen10 Compute Module prior to v1.28
- HPE Synergy 480 Gen9 Compute Module prior to v2.54
- HPE ProLiant ML30 Gen9 Server prior to v2.52
- HPE ProLiant XL190r Gen10 Server prior to v1.28
- HPE ProLiant XL250a Gen9 Server prior to v2.54
- HPE ProLiant XL190r Gen9 Server prior to v2.54
- HP ProLiant DL80 Gen9 Server prior to v2.54
- HPE ProLiant DL180 Gen9 Server prior to v2.54
- HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server prior to v2.54
- HPE ProLiant WS460c Gen9 Workstation prior to v2.54
- HPE ProLiant DL580 Gen9 Special Server prior to v2.54
- HPE Synergy 680 Gen9 Compute Modules prior to v2.54
- HPE ProLiant XL260a Gen9 Server prior to 1/22/2018
- HPE ProLiant m510 Server Cartridge prior to 1/22/2018
- HPE ProLiant m710p Server Cartridge prior to 12/12/2017
- HP ProLiant m350 Server Cartridge prior to 12/12/2017
- HP ProLiant m300 Server Cartridge prior to 12/12/2017
- HP ProLiant ML350e Gen8 Server prior to 12/12/2017
- HPE ProLiant ML350e Gen8 v2 Server prior to 12/12/2017
- HP ProLiant BL460c Gen8 Server prior to 12/12/2017
- HP ProLiant BL660c Gen8 Server prior to 12/12/2017
- HPE ProLiant SL4540 Gen8 1 Node Server prior to 12/12/2017
- HP ProLiant DL380e Gen8 Server prior to 12/12/2017
- HP ProLiant DL360e Gen8 Server prior to 12/12/2017
- HP ProLiant ML350p Gen8 Server prior to 12/12/2017
- HP ProLiant DL360p Gen8 Server prior to 12/12/2017
- HP ProLiant DL380p Gen8 Server prior to 12/12/2017
- HP ProLiant DL320e Gen8 Server prior to 12/12/2017
- HPE ProLiant DL320e Gen8 v2 Server prior to 12/12/2017
- HP ProLiant ML310e Gen8 Server prior to 12/12/2017
- HPE ProLiant ML310e Gen8 v2 Server prior to 12/12/2017
- HP ProLiant DL160 Gen8 Server prior to 12/12/2017
- HP ProLiant SL270s Gen8 Server prior to 12/12/2017
- HP ProLiant SL250s Gen8 Server prior to 12/12/2017
- HP ProLiant SL230s Gen8 Server prior to 12/12/2017
- HP ProLiant DL560 Gen8 Server prior to 12/12/2017
- HPE ProLiant SL210t Gen8 Server prior to 12/12/2017
- HP ProLiant DL580 Gen8 Server prior to 12/12/2017 (v1.98)
- HP ProLiant ML10 Server prior to 12/12/2017
- HP ProLiant m710 Server Cartridge prior to 12/12/2017 (v1.60)
- HPE Synergy Composer prior to 12/12/2017
- HPE Integrity Superdome X with BL920s Blades prior to 8.8.6
- HPE Superdome Flex Server prior to 2.3.110
- HP ProLiant DL360 Gen9 Server prior to v2.54
- HPE Synergy 620 Gen9 Compute Module prior to v2.54
- HPE ProLiant Thin Micro TM200 Server prior to 1/16/2017
- HPE ProLiant ML350 Gen10 Server prior to v1.28
- HP ProLiant BL420c Gen8 Server prior to 12/12/2017
- HPE ProLiant ML10 v2 Server prior to 12/12/2017
- HPE ProLiant MicroServer Gen8 prior to 12/12/2017
- HPE Synergy 660 Gen10 Compute Module prior to v1.28
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5715
8.2 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
6.8 (AV:A/AC:L/Au:N/C:C/I:P/A:N)
CVE-2017-5753
5.0 CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)
CVE-2017-5754
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has made the following system ROM updates which include an updated microcode to resolve the vulnerability:
-
HPE has provided a customer bulletin https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us with specific instructions to obtain the udpated sytem ROM
-
Note:
- CVE-2017-5715 requires that the System ROM be updated and a vendor supplied operating system update be applied as well.
- For CVE-2017-5753, CVE-2017-5754 require only updates of a vendor supplied operating system.
- HPE will continue to add additional products to the list. Not all listed products have updated system ROMs yet. Impacted products awaiting system ROM updates are marked TBS (to be supplied).
HISTORY
Version:1 (rev.1) - 4 January 2018 Initial release
Version:2 (rev.2) - 5 January 2018 Added additional impacted products
Version:3 (rev.3) - 10 January 2018 Added more impacted products
Version:4 (rev.4) - 9 January 2018 Fixed product ID
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to [email protected].
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: [email protected]
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Summary
VMware Virtual Appliance updates address side-channel analysis due to speculative execution
Note:
This document will focus on VMware Virtual Appliances which are affected by the known variants of CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754. For more information please see Knowledge Base article 52264.
These mitigations are part of the Operating System-Specific Mitigations category described in VMware Knowledge Base article 52245. Relevant Products
vCloud Usage Meter (UM) Identity Manager (vIDM) vCenter Server (vCSA) vSphere Data Protection (VDP) vSphere Integrated Containers (VIC) vRealize Automation (vRA)
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2017-5753 (Bounds Check bypass), CVE-2017-5715 (Branch Target Injection), CVE-2017-5754 (Rogue data cache load) to these issues.
Column 5 of the following table lists the action required to mitigate the observed vulnerability in each release, if a solution is available.
VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ========= ============= ========== UM 3.x VA Important Patch Pending KB52467
vIDM 3.x, 2.x VA Important Patch Pending KB52284
vCSA 6.5 VA Important Patch Pending KB52312 vCSA 6.0 VA Important Patch Pending KB52312 vCSA 5.5 VA N/A Unaffected None
VDP 6.x VA Important Patch Pending None
VIC 1.x VA Important 1.3.1 None
vRA 7.x VA Important Patch Pending KB52377 vRA 6.x VA Important Patch Pending KB52497
- Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
vSphere Integrated Containers 1.3.1 Downloads and Documentation: https://my.vmware.com/group/vmware/get-download?downloadGroup=VIC131
- Change log
2018-02-08: VMSA-2018-0007 Initial security advisory in conjunction with the release of vSphere Integrated Containers 1.3.1 on 2018-02-08. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
[email protected]
[email protected]
[email protected]
E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Twitter https://twitter.com/VMwareSRC
Copyright 2018 VMware Inc. All rights reserved. 6.4) - x86_64
Security Fix(es):
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.
Note: This issue is present in hardware and cannot be fully fixed via software update. Please refer to References section for further information about this issue and the performance impact.
In this update mitigations for x86-64 architecture are provided.
Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)
Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.
Red Hat would like to thank Google Project Zero for reporting these issues. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201804-08
https://security.gentoo.org/
Severity: Normal Title: QEMU: Multiple vulnerabilities Date: April 08, 2018 Bugs: #629348, #638506, #643432, #646814, #649616 ID: 201804-08
Synopsis
Multiple vulnerabilities have been found in QEMU, the worst of which may allow an attacker to execute arbitrary code.
Background
QEMU is a generic and open source machine emulator and virtualizer.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulation/qemu < 2.11.1-r1 >= 2.11.1-r1
Description
Multiple vulnerabilities have been discovered in QEMU. Please review the CVE identifiers referenced below for details.
Impact
An attacker could execute arbitrary code, cause a Denial of Service condition, or obtain sensitive information.
Workaround
There is no known workaround at this time.
Resolution
All QEMU users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.11.1-r1"
References
[ 1 ] CVE-2017-13672 https://nvd.nist.gov/vuln/detail/CVE-2017-13672 [ 2 ] CVE-2017-15124 https://nvd.nist.gov/vuln/detail/CVE-2017-15124 [ 3 ] CVE-2017-16845 https://nvd.nist.gov/vuln/detail/CVE-2017-16845 [ 4 ] CVE-2017-17381 https://nvd.nist.gov/vuln/detail/CVE-2017-17381 [ 5 ] CVE-2017-18030 https://nvd.nist.gov/vuln/detail/CVE-2017-18030 [ 6 ] CVE-2017-18043 https://nvd.nist.gov/vuln/detail/CVE-2017-18043 [ 7 ] CVE-2017-5715 https://nvd.nist.gov/vuln/detail/CVE-2017-5715 [ 8 ] CVE-2018-5683 https://nvd.nist.gov/vuln/detail/CVE-2018-5683 [ 9 ] CVE-2018-5748 https://nvd.nist.gov/vuln/detail/CVE-2018-5748 [ 10 ] CVE-2018-7550 https://nvd.nist.gov/vuln/detail/CVE-2018-7550
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201804-08
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to [email protected] or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 .
Software Description: - webkit2gtk: Web content engine library for GTK+
Details:
It was discovered that speculative execution performed by modern CPUs could leak information through a timing side-channel attack, and that this could be exploited in web browser JavaScript engines. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information from other domains, bypassing same-origin restrictions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0826", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "xeon e5 2650l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "720qm" }, { "model": "xeon e3 1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7235" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6585r" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3710" }, { "model": "xeon e5 2430l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210m" }, { "model": "xeon e3 1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10c" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5550" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6154" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v3" }, { "model": "communications diameter signaling router", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "740qm" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6510" }, { "model": "xeon e3 1225 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3235rk" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4720hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4000m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2405s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2435m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3380m" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1545m_v5" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360" }, { "model": "xeon e5 2637", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2518" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3317u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700ec" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "460m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4807" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "15" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3480" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3580" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y32" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5677" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330m" }, { "model": "xeon e3 1278l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x6550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5750hq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570r" }, { "model": "xeon e3 1265l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2760qm" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134m" }, { "model": "xeon e5 2430 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "650" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3295rk" }, { "model": "xeon e3 1280 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4109t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5550u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3690" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v2" }, { "model": "xeon e5 2603 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "57" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6260u" }, { "model": "xeon e5 2620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1281 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660" }, { "model": "xeon e5 2450l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.10" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735d" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2340ue" }, { "model": "xeon e5 2630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867l" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5618" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y30" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775c" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8180" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460" }, { "model": "xeon e3 1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2650l_v4" }, { "model": "xeon e5 2420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675c" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v2" }, { "model": "xeon e5 2648l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5557u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v3" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3445" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3455" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2629m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3700" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138f" }, { "model": "xeon e5 2438l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5257u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5502" }, { "model": "xeon bronze 3106", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2480" }, { "model": "xeon e5 2470 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x5-e3930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600t" }, { "model": "xeon e5 2407 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2450 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2675qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2940" }, { "model": "xeon e5 2609 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350k" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1850" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2358" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460t" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7285" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460s" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2900" }, { "model": "xeon e5 2609 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2550" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3808" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3350" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5200u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4260u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5506" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126f" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4750hq" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1515m_v5" }, { "model": "xeon e3 1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qm" }, { "model": "xeon e5 2418l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4722hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5500u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8650u" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3205rk" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v5" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2540m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5650" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3720qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210" }, { "model": "core m7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y75" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3785" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820eq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3827" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2102" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610me" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1800" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330e" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3010" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "470um" }, { "model": "xeon e5 1428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v3" }, { "model": "xeon e5 2430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4890_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5649" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "610e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370t" }, { "model": "xeon e5 2428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2640 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667" }, { "model": "xeon e5 2618l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2300" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "530" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660lm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5690" }, { "model": "xeon e5 2643 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2390t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4105" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2515e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3530" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4880_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176f" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1565l_v5" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4648_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600u" }, { "model": "xeon e5 1660 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2467m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850hq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5680" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8857_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8837" }, { "model": "xeon e5 2620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4800mq" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2830" }, { "model": "xeon e3 1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3406" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4628l_v4" }, { "model": "xeon e5 2618l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3480" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2665" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v2" }, { "model": "xeon e3 1220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500t" }, { "model": "xeon e5 2630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2550k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3689y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700hq" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3538" }, { "model": "xeon e3 1265l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5672" }, { "model": "xeon e5 1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hk" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v2" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3570" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3350p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3440" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3560" }, { "model": "xeon e5 1680 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3437u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300y" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3460" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3355" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6157u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5667" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160f" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4624l_v2" }, { "model": "xeon e5 1650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140m" }, { "model": "xeon e3 1268l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4550u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2520" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200u" }, { "model": "xeon e5 2608l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2803" }, { "model": "xeon e5 2643 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5518" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980x" }, { "model": "xeon e5 1620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2538" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3308" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y51" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4250u" }, { "model": "xeon e5 2637 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770r" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3955" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2357m" }, { "model": "xeon e3 1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hq" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2460" }, { "model": "xeon e3 1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8158" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6006u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4158u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217ue" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2750" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585l_v5" }, { "model": "xeon e5 2408l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3758" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3360m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7530" }, { "model": "xeon e5 1650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2348m" }, { "model": "xeon e3 1275 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v2" }, { "model": "xeon e3 1240 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v2" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3229y" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3845" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2308" }, { "model": "xeon e3 1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702ec" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650" }, { "model": "xeon e5 2637 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620ue" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5503" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6200u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4510u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5640" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200m" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y71" }, { "model": "xeon e5 2630l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5122" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2370m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3427u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5575r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4558u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710mq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8168" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2630qm" }, { "model": "xeon e3 1241 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4422e" }, { "model": "xeon e3 1230l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2312m" }, { "model": "xeon e3 1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v3" }, { "model": "vm virtualbox", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "5.2.0" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7555" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700" }, { "model": "xeon e3 1271 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3635qm" }, { "model": "xeon e3 1260l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6167u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330te" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134" }, { "model": "xeon e3 1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7567u" }, { "model": "xeon e5 1650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "965" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3115c" }, { "model": "xeon e3 1245 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5670" }, { "model": "vm virtualbox", "scope": "lt", "trust": 1.0, "vendor": "oracle", "version": "5.1.32" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2738" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940xm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3430" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660ue" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "975" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5675" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450m" }, { "model": "xeon e3 1240 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658" }, { "model": "xeon e5 2623 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qm" }, { "model": "xeon e3 1285 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4000" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3470" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4760hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "990x" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200h" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8600k" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6146" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4960hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v3" }, { "model": "xeon e5 2628l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v3" }, { "model": "xeon e5 2630 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3590" }, { "model": "xeon e5 1428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v3" }, { "model": "xeon e5 2448l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5549" }, { "model": "xeon e5 2428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745d" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7545" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850eq" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2350" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2560" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2758" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120me" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7560u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5508" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5509" }, { "model": "xeon e5 2637 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y75" }, { "model": "xeon e3 1285l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3958" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6102e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4302y" }, { "model": "xeon e5 2418l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3805" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3825" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770d" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3337u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3508" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8153" }, { "model": "xeon e5 2603 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5118" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2910" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3405" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2657m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5250u" }, { "model": "xeon e3 1286l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1660 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5115" }, { "model": "xeon e3 12201 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590t" }, { "model": "xeon e5 2640 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "880" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3820qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2520m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650u" }, { "model": "xeon e3 1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5640" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4005" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3826" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2367m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3740qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2808" }, { "model": "xeon e3 1225 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5647" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4980hq" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3710" }, { "model": "xeon e3 1240l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "73" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2715qe" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4020y" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3460" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2130" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3670" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "17" }, { "model": "hci management node", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v2" }, { "model": "atom x7-e3950", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2430l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2718" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2610ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "390m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v3" }, { "model": "simatic winac rtx \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "2010" }, { "model": "xeon e5 2448l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4025u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6360u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7920hq" }, { "model": "xeon e5 2407", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870hq" }, { "model": "xeon e3 1275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v3" }, { "model": "xeon e3 1270 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "930" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2655le" }, { "model": "xeon e3 1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2807" }, { "model": "xeon e3 1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y31" }, { "model": "xeon e5 2618l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v2" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "9" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8550u" }, { "model": "xeon e3 1220 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5506" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920xm" }, { "model": "xeon e3 1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3630qm" }, { "model": "xeon e5 2450l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670k" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2840" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7542" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620m" }, { "model": "xeon e3 1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2410m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400t" }, { "model": "xeon e5 1620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3130" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3339y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2620m" }, { "model": "xeon e3 1276 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1558l_v5" }, { "model": "xeon e3 1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4108" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2516" }, { "model": "communications diameter signaling router", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.1" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2960xm" }, { "model": "xeon e5 2650l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "840qm" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699r_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4400e" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6152" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3815" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v4" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2920" }, { "model": "xeon e5 1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6685r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770s" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2815" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230f" }, { "model": "xeon e3 1220l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "970" }, { "model": "xeon e3 1230 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3225" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "875k" }, { "model": "xeon e3 1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350h" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1578l_v5" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3840qm" }, { "model": "xeon e3 1226 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v6" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4308u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2920xm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3338" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712mq" }, { "model": "xeon e5 1428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3230m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2720qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3227u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740d" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2930" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5539" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5157u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8164" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658a_v3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690" }, { "model": "xeon e5 2648l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2380p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5528" }, { "model": "xeon e3 1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700mq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5606" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4005u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640lm" }, { "model": "xeon e5 2628l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y57" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "820qm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3450" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600k" }, { "model": "xeon e3 1285 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2730" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3426" }, { "model": "xeon e3 12201", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v4" }, { "model": "xeon e5 2418l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3475s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340te" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2637m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3750" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120m" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1750" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "580m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5540" }, { "model": "xeon e5 1630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6136" }, { "model": "xeon e5 2450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699a_v4" }, { "model": "xeon e5 2403", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4785t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2375m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860hq" }, { "model": "xeon e3 1270 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3200rk" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770te" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585_v5" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "670" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "960" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6128" }, { "model": "xeon e5 2403 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440eq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2700k" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3230rk" }, { "model": "xeon e3 1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7540" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v2" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2649m" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4205" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2580" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6402p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8830" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7295" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5660" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.04" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660um" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3950" }, { "model": "hci compute node", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2617m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697a_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870" }, { "model": "xeon e3 1245 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3667u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v3" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2806" }, { "model": "xeon e5 1630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775r" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736f" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2557m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4578u" }, { "model": "xeon e5 2470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6144" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3050" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2316" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "350m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030u" }, { "model": "xeon e5 2648l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5645" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5590" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4910mq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6287u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100u" }, { "model": "xeon e3 1220 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-1105c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v3" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "75" }, { "model": "xeon e3 1258l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4202y" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100h" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2320" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8250u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3858" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2508" }, { "model": "xeon e3 1235", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650l" }, { "model": "xeon e3 1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3520m" }, { "model": "xeon e5 2640 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7660u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4410e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5638" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1575m_v5" }, { "model": "xeon e3 1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750" }, { "model": "xeon e5 2609 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "370m" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2810" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1900" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360t" }, { "model": "vm virtualbox", "scope": "lt", "trust": 1.0, "vendor": "oracle", "version": "5.2.6" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2430m" }, { "model": "xeon e5 1620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210f" }, { "model": "communications diameter signaling router", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.0.0" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6132" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5630" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2890_v2" }, { "model": "xeon e5 1660 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4200" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v4" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5607" }, { "model": "xeon e3 1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4012y" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y70" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4771" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520e" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3520" }, { "model": "xeon e5 2420 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6540" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5518" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5650u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620um" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5620" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "480m" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775d" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620lm" }, { "model": "xeon e3 1246 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1265l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4278u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3130m" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230" }, { "model": "xeon e3 1275l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2640m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5119t" }, { "model": "xeon e5 2623 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2125" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2805" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4657l_v2" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y30" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517ue" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5570" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5520" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3320m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3245" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2420" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2510e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3632qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710hq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6150" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3687u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5015u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6267u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300u" }, { "model": "atom x5-e3940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1285l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v4" }, { "model": "solidfire", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4765t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3830" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670t" }, { "model": "xeon e5 1660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3680" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5287u" }, { "model": "xeon e5 2630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v3" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2635qm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670r" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v4" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300" }, { "model": "xeon e3 1230 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v4" }, { "model": "xeon e5 2440 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5603" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "655k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4102e" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1505m_v6" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4810mq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250f" }, { "model": "communications diameter signaling router", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8400" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5609" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210h" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3708" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6442eq" }, { "model": "xeon e3 1290 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2648l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1680 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3439y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2365m" }, { "model": "xeon e3 1231 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8156" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6098p" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5504" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4288u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4900mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5630" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2537m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3555le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350u" }, { "model": "xeon e3 1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5020u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "661" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2677m" }, { "model": "xeon e5 2628l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3510" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "72" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2338" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8894_v4" }, { "model": "xeon e3 1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4258u" }, { "model": "xeon e5 2609", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5507" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2820" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680" }, { "model": "xeon e5 2640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5010u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4617" }, { "model": "xeon e3 1280 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2377m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2115c" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2710qe" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5580" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4120u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2350m" }, { "model": "xeon e3 1105c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4220y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500te" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7560" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6350hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430s" }, { "model": "xeon e3 1286 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3450" }, { "model": "xeon bronze 3104", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1290", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2880_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6320" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5005u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680um" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3795" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "450m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702hq" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10a" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5687" }, { "model": "xeon e3 1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v4" }, { "model": "xeon e5 2620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330e" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y54" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2328m" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380um" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2105" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3150" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3000" }, { "model": "xeon e5 2608l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440hq" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3265rk" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3537u" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "amd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "arm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell emc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "qualcomm incorporated", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "synology", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": "windows sp1", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "7" }, { "model": "internet explorer", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "11" }, { "model": "windows", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "8.1" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "google", "version": "v8" }, { "model": "windows", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "10" }, { "model": "edge", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "0" }, { "model": "xeon cpu e5-1650", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "cortex a57", "scope": null, "trust": 0.6, "vendor": "arm", "version": null }, { "model": "pro a8-9600 r7", "scope": null, "trust": 0.6, "vendor": "amd", "version": null }, { "model": "compute cores 4c+6g", "scope": "eq", "trust": 0.6, "vendor": "amd", "version": "10" }, { "model": "fx -8320 eight-core processor", "scope": null, "trust": 0.6, "vendor": "amd", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "145711" }, { "db": "PACKETSTORM", "id": "145718" }, { "db": "PACKETSTORM", "id": "146007" }, { "db": "PACKETSTORM", "id": "145937" }, { "db": "PACKETSTORM", "id": "145674" }, { "db": "PACKETSTORM", "id": "145651" }, { "db": "PACKETSTORM", "id": "145654" } ], "trust": 0.7 }, "cve": "CVE-2017-5715", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2017-5715", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CNVD-2018-00302", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-113918", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2017-5715", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2017-5715", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-00302", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-113918", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as \"Variant 3a\" and \"Variant 4\". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \\\"melts\\\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \\\"cross-border\\\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Intel Xeon CPU E5-1650 v3, v2, v4 versions; Xeon E3-1265l v2, v3, v4 Version; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. ==========================================================================\nUbuntu Security Notice USN-3597-2\nMarch 15, 2018\n\nlinux-hwe vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \nThis update provides the corresponding updates for the Linux Hardware\nEnablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04 LTS. \n\nUSNS 3541-2 and 3523-2 provided mitigations for Spectre and Meltdown\n(CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) for the i386, amd64,\nand ppc64el architectures for Ubuntu 16.04 LTS. This flaw is known as Meltdown. A local attacker could\n use this to expose sensitive information, including kernel memory. This flaw is known as Spectre. A local attacker could use this to\n expose sensitive information, including kernel memory. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. Relevant releases/architectures:\n\nImage Updates for RHV-H - noarch\n\n3. These\npackages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. RHVH features a Cockpit user interface for\nmonitoring the host\u0027s resources and performing administrative tasks. Description:\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm package provides the\nuser-space component for running virtual machines that use KVM. (CVE-2017-5715)\n\nNote: This is the qemu-kvm side of the CVE-2017-5715 mitigation. Once\nall virtual machines have shut down, start them again for this update to\ntake effect. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: linux-firmware security update\nAdvisory ID: RHSA-2018:0094-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:0094\nIssue date: 2018-01-16\n=====================================================================\n\n1. Summary:\n\nAn update for linux-firmware is now available for Red Hat Enterprise Linux\n7, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise\nLinux 7.2 Telco Extended Update Support, Red Hat Enterprise Linux 7.2\nUpdate Services for SAP Solutions, and Red Hat Enterprise Linux 7.3\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch\nRed Hat Enterprise Linux Server (v. 7) - noarch\nRed Hat Enterprise Linux Server AUS (v. 7.2) - noarch\nRed Hat Enterprise Linux Server E4S (v. 7.2) - noarch\nRed Hat Enterprise Linux Server EUS (v. 7.3) - noarch\nRed Hat Enterprise Linux Server TUS (v. 7.2) - noarch\nRed Hat Enterprise Linux Workstation (v. 7) - noarch\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch\n\n3. Description:\n\nThe linux-firmware packages contain all of the firmware files that are\nrequired by various devices to operate. \n\nThis update supersedes microcode provided by Red Hat with the CVE-2017-5715\n(aSpectrea) CPU branch injection vulnerability mitigation. (Historically,\nRed Hat has provided updated microcode, developed by our microprocessor\npartners, as a customer convenience.) Further testing has uncovered\nproblems with the microcode provided along with the aSpectrea mitigation\nthat could lead to system instabilities. As a result, Red Hat is providing\nan microcode update that reverts to the last known good microcode version\ndated before 03 January 2018. Red Hat strongly recommends that customers\ncontact their hardware provider for the latest microcode updates. \n\nIMPORTANT: Customers using Intel Skylake-, Broadwell-, and Haswell-based\nplatforms must obtain and install updated microcode from their hardware\nvendor immediately. The \"Spectre\" mitigation requires both an updated\nkernel from Red Hat and updated microcode from your hardware vendor. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nlinux-firmware-20170606-58.gitc990aae.el7_4.src.rpm\n\nnoarch:\niwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm\niwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm\niwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm\niwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm\niwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm\niwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm\niwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm\niwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm\niwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm\niwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm\niwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm\niwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm\niwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm\nlinux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3):\n\nSource:\nlinux-firmware-20160830-51.git7534e19.el7_3.src.rpm\n\nnoarch:\niwl100-firmware-39.31.5.1-51.el7_3.noarch.rpm\niwl1000-firmware-39.31.5.1-51.el7_3.noarch.rpm\niwl105-firmware-18.168.6.1-51.el7_3.noarch.rpm\niwl135-firmware-18.168.6.1-51.el7_3.noarch.rpm\niwl2000-firmware-18.168.6.1-51.el7_3.noarch.rpm\niwl2030-firmware-18.168.6.1-51.el7_3.noarch.rpm\niwl3160-firmware-22.0.7.0-51.el7_3.noarch.rpm\niwl3945-firmware-15.32.2.9-51.el7_3.noarch.rpm\niwl4965-firmware-228.61.2.24-51.el7_3.noarch.rpm\niwl5000-firmware-8.83.5.1_1-51.el7_3.noarch.rpm\niwl5150-firmware-8.24.2.2-51.el7_3.noarch.rpm\niwl6000-firmware-9.221.4.1-51.el7_3.noarch.rpm\niwl6000g2a-firmware-17.168.5.3-51.el7_3.noarch.rpm\niwl6000g2b-firmware-17.168.5.2-51.el7_3.noarch.rpm\niwl6050-firmware-41.28.5.1-51.el7_3.noarch.rpm\niwl7260-firmware-22.0.7.0-51.el7_3.noarch.rpm\niwl7265-firmware-22.0.7.0-51.el7_3.noarch.rpm\nlinux-firmware-20160830-51.git7534e19.el7_3.noarch.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nlinux-firmware-20170606-58.gitc990aae.el7_4.src.rpm\n\nnoarch:\niwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm\niwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm\niwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm\niwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm\niwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm\niwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm\niwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm\niwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm\niwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm\niwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm\niwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm\niwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm\niwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm\nlinux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 7.2):\n\nSource:\nlinux-firmware-20150904-45.git6ebf5d5.el7_2.src.rpm\n\nnoarch:\niwl100-firmware-39.31.5.1-45.el7_2.noarch.rpm\niwl1000-firmware-39.31.5.1-45.el7_2.noarch.rpm\niwl105-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl135-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl2000-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl2030-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl3160-firmware-22.0.7.0-45.el7_2.noarch.rpm\niwl3945-firmware-15.32.2.9-45.el7_2.noarch.rpm\niwl4965-firmware-228.61.2.24-45.el7_2.noarch.rpm\niwl5000-firmware-8.83.5.1_1-45.el7_2.noarch.rpm\niwl5150-firmware-8.24.2.2-45.el7_2.noarch.rpm\niwl6000-firmware-9.221.4.1-45.el7_2.noarch.rpm\niwl6000g2a-firmware-17.168.5.3-45.el7_2.noarch.rpm\niwl6000g2b-firmware-17.168.5.2-45.el7_2.noarch.rpm\niwl6050-firmware-41.28.5.1-45.el7_2.noarch.rpm\niwl7260-firmware-22.0.7.0-45.el7_2.noarch.rpm\niwl7265-firmware-22.0.7.0-45.el7_2.noarch.rpm\nlinux-firmware-20150904-45.git6ebf5d5.el7_2.noarch.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.2):\n\nSource:\nlinux-firmware-20150904-45.git6ebf5d5.el7_2.src.rpm\n\nnoarch:\niwl100-firmware-39.31.5.1-45.el7_2.noarch.rpm\niwl1000-firmware-39.31.5.1-45.el7_2.noarch.rpm\niwl105-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl135-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl2000-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl2030-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl3160-firmware-22.0.7.0-45.el7_2.noarch.rpm\niwl3945-firmware-15.32.2.9-45.el7_2.noarch.rpm\niwl4965-firmware-228.61.2.24-45.el7_2.noarch.rpm\niwl5000-firmware-8.83.5.1_1-45.el7_2.noarch.rpm\niwl5150-firmware-8.24.2.2-45.el7_2.noarch.rpm\niwl6000-firmware-9.221.4.1-45.el7_2.noarch.rpm\niwl6000g2a-firmware-17.168.5.3-45.el7_2.noarch.rpm\niwl6000g2b-firmware-17.168.5.2-45.el7_2.noarch.rpm\niwl6050-firmware-41.28.5.1-45.el7_2.noarch.rpm\niwl7260-firmware-22.0.7.0-45.el7_2.noarch.rpm\niwl7265-firmware-22.0.7.0-45.el7_2.noarch.rpm\nlinux-firmware-20150904-45.git6ebf5d5.el7_2.noarch.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.2):\n\nSource:\nlinux-firmware-20150904-45.git6ebf5d5.el7_2.src.rpm\n\nnoarch:\niwl100-firmware-39.31.5.1-45.el7_2.noarch.rpm\niwl1000-firmware-39.31.5.1-45.el7_2.noarch.rpm\niwl105-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl135-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl2000-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl2030-firmware-18.168.6.1-45.el7_2.noarch.rpm\niwl3160-firmware-22.0.7.0-45.el7_2.noarch.rpm\niwl3945-firmware-15.32.2.9-45.el7_2.noarch.rpm\niwl4965-firmware-228.61.2.24-45.el7_2.noarch.rpm\niwl5000-firmware-8.83.5.1_1-45.el7_2.noarch.rpm\niwl5150-firmware-8.24.2.2-45.el7_2.noarch.rpm\niwl6000-firmware-9.221.4.1-45.el7_2.noarch.rpm\niwl6000g2a-firmware-17.168.5.3-45.el7_2.noarch.rpm\niwl6000g2b-firmware-17.168.5.2-45.el7_2.noarch.rpm\niwl6050-firmware-41.28.5.1-45.el7_2.noarch.rpm\niwl7260-firmware-22.0.7.0-45.el7_2.noarch.rpm\niwl7265-firmware-22.0.7.0-45.el7_2.noarch.rpm\nlinux-firmware-20150904-45.git6ebf5d5.el7_2.noarch.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.3):\n\nSource:\nlinux-firmware-20160830-51.git7534e19.el7_3.src.rpm\n\nnoarch:\niwl100-firmware-39.31.5.1-51.el7_3.noarch.rpm\niwl1000-firmware-39.31.5.1-51.el7_3.noarch.rpm\niwl105-firmware-18.168.6.1-51.el7_3.noarch.rpm\niwl135-firmware-18.168.6.1-51.el7_3.noarch.rpm\niwl2000-firmware-18.168.6.1-51.el7_3.noarch.rpm\niwl2030-firmware-18.168.6.1-51.el7_3.noarch.rpm\niwl3160-firmware-22.0.7.0-51.el7_3.noarch.rpm\niwl3945-firmware-15.32.2.9-51.el7_3.noarch.rpm\niwl4965-firmware-228.61.2.24-51.el7_3.noarch.rpm\niwl5000-firmware-8.83.5.1_1-51.el7_3.noarch.rpm\niwl5150-firmware-8.24.2.2-51.el7_3.noarch.rpm\niwl6000-firmware-9.221.4.1-51.el7_3.noarch.rpm\niwl6000g2a-firmware-17.168.5.3-51.el7_3.noarch.rpm\niwl6000g2b-firmware-17.168.5.2-51.el7_3.noarch.rpm\niwl6050-firmware-41.28.5.1-51.el7_3.noarch.rpm\niwl7260-firmware-22.0.7.0-51.el7_3.noarch.rpm\niwl7265-firmware-22.0.7.0-51.el7_3.noarch.rpm\nlinux-firmware-20160830-51.git7534e19.el7_3.noarch.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nlinux-firmware-20170606-58.gitc990aae.el7_4.src.rpm\n\nnoarch:\niwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm\niwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm\niwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm\niwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm\niwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm\niwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm\niwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm\niwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm\niwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm\niwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm\niwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm\niwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm\niwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm\nlinux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):\n\nSource:\nlinux-firmware-20170606-58.gitc990aae.el7_4.src.rpm\n\nnoarch:\niwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm\niwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm\niwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm\niwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm\niwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm\niwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm\niwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm\niwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm\niwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm\niwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm\niwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm\niwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm\niwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm\nlinux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nlinux-firmware-20170606-58.gitc990aae.el7_4.src.rpm\n\nnoarch:\niwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm\niwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm\niwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm\niwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm\niwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm\niwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm\niwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm\niwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm\niwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm\niwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm\niwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm\niwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm\niwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm\niwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm\nlinux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/speculativeexecution\nhttps://access.redhat.com/security/cve/CVE-2017-5715\n\n8. Contact:\n\nThe Red Hat security contact is \[email protected]\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFaXncBXlSAg2UNWIIRAtYfAKCfEHxjgLYls9QYIF/FrJPQWAu5mgCgkwVp\nauhGTN4XjBc6+TS+7HEUZvA=\n=zRtn\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\[email protected]\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: hpesbhf03805en_us\nVersion: 4\n\nHPESBHF03805 rev.4 - Certain HPE products using Microprocessors from Intel,\nAMD, and ARM, with Speculative Execution, Elevation of Privilege and\nInformation Disclosure. \n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2018-01-10\nLast Updated: 2018-01-09\n\nPotential Security Impact: Local: Disclosure of Information, Elevation of\nPrivilege\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nOn January 3 2018, side-channel security vulnerabilities involving\nspeculative execution were publicly disclosed. These vulnerabilities may\nimpact the listed HPE products, potentially leading to information disclosure\nand elevation of privilege. Mitigation and resolution of these\nvulnerabilities may call for both an operating system update, provided by the\nOS vendor, and a system ROM update from HPE. \n\n\n**Note:**\n\n * This issue takes advantage of techniques commonly used in many modern\nprocessor architectures. \n * For further information, microprocessor vendors have provided security\nadvisories:\n \n - Intel:\n\u003chttps://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026langu\ngeid=en-fr\u003e\n - AMD: \u003chttp://www.amd.com/en/corporate/speculative-execution\u003e\n - ARM: \u003chttps://developer.arm.com/support/security-update\u003e\n\nReferences:\n\n - PSRT110634\n - PSRT110633\n - PSRT110632\n - CVE-2017-5715 - aka Spectre, branch target injection\n - CVE-2017-5753 - aka Spectre, bounds check bypass\n - CVE-2017-5754 - aka Meltdown, rogue data cache load, memory access\npermission check performed after kernel memory read\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\n - HPE ProLiant DL380 Gen10 Server prior to v1.28\n - HPE ProLiant DL180 Gen10 Server prior to v1.28\n - HPE ProLiant DL160 Gen10 Server prior to v1.28\n - HPE ProLiant DL360 Gen10 Server prior to v1.28\n - HPE ProLiant ML110 Gen10 Server prior to v1.28\n - HPE ProLiant DL580 Gen10 Server prior to v1.28\n - HPE ProLiant DL560 Gen10 Server prior to v1.28\n - HPE ProLiant DL120 Gen10 Server prior to v1.28\n - HPE ProLiant ML350 Gen10 Server prior to v1.28\n - HPE ProLiant XL450 Gen10 Server prior to v1.28\n - HPE ProLiant XL170r Gen10 Server prior to v1.28\n - HPE ProLiant BL460c Gen10 Server Blade prior to v1.28\n - HPE ProLiant XL230a Gen9 Server prior to v2.54\n - HPE ProLiant XL230k Gen10 Server prior to v1.28\n - HPE ProLiant XL730f Gen9 Server prior to v2.54\n - HPE ProLiant XL740f Gen9 Server prior to v2.54\n - HPE ProLiant XL750f Gen9 Server prior to v2.54\n - HPE ProLiant XL170r Gen9 Server prior to v2.54\n - HP ProLiant DL60 Gen9 Server prior to v2.54\n - HPE ProLiant XL450 Gen9 Server prior to v2.54\n - HP ProLiant DL160 Gen9 Server prior to v2.54\n - HPE Apollo 4200 Gen9 Server prior to v2.54\n - HP ProLiant BL460c Gen9 Server Blade prior to v2.54\n - HP ProLiant ML110 Gen9 Server prior to v2.54\n - HP ProLiant ML150 Gen9 Server prior to v2.54 \n - HPE ProLiant ML350 Gen9 Server prior to v2.54\n - HP ProLiant DL380 Gen9 Server prior to v2.54\n - HP ProLiant DL120 Gen9 Server prior to v2.54\n - HPE ProLiant DL560 Gen9 Server prior to v2.54\n - HPE ProLiant XL270d Gen9 Special Server prior to v2.54\n - HP ProLiant BL660c Gen9 Server prior to v2.54\n - HPE ProLiant m710x Server Cartridge prior to v1.60\n - HPE ProLiant DL20 Gen9 Server prior to v2.52\n - HPE ProLiant DL385 Gen10 Server prior to v1.04\n - HPE Synergy 660 Gen9 Compute Module prior to v2.54\n - HPE Synergy 480 Gen10 Compute Module prior to v1.28\n - HPE Synergy 480 Gen9 Compute Module prior to v2.54\n - HPE ProLiant ML30 Gen9 Server prior to v2.52\n - HPE ProLiant XL190r Gen10 Server prior to v1.28\n - HPE ProLiant XL250a Gen9 Server prior to v2.54\n - HPE ProLiant XL190r Gen9 Server prior to v2.54\n - HP ProLiant DL80 Gen9 Server prior to v2.54\n - HPE ProLiant DL180 Gen9 Server prior to v2.54\n - HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server\nprior to v2.54\n - HPE ProLiant WS460c Gen9 Workstation prior to v2.54\n - HPE ProLiant DL580 Gen9 Special Server prior to v2.54\n - HPE Synergy 680 Gen9 Compute Modules prior to v2.54\n - HPE ProLiant XL260a Gen9 Server prior to 1/22/2018\n - HPE ProLiant m510 Server Cartridge prior to 1/22/2018\n - HPE ProLiant m710p Server Cartridge prior to 12/12/2017\n - HP ProLiant m350 Server Cartridge prior to 12/12/2017\n - HP ProLiant m300 Server Cartridge prior to 12/12/2017\n - HP ProLiant ML350e Gen8 Server prior to 12/12/2017\n - HPE ProLiant ML350e Gen8 v2 Server prior to 12/12/2017\n - HP ProLiant BL460c Gen8 Server prior to 12/12/2017\n - HP ProLiant BL660c Gen8 Server prior to 12/12/2017\n - HPE ProLiant SL4540 Gen8 1 Node Server prior to 12/12/2017\n - HP ProLiant DL380e Gen8 Server prior to 12/12/2017\n - HP ProLiant DL360e Gen8 Server prior to 12/12/2017\n - HP ProLiant ML350p Gen8 Server prior to 12/12/2017\n - HP ProLiant DL360p Gen8 Server prior to 12/12/2017\n - HP ProLiant DL380p Gen8 Server prior to 12/12/2017\n - HP ProLiant DL320e Gen8 Server prior to 12/12/2017\n - HPE ProLiant DL320e Gen8 v2 Server prior to 12/12/2017\n - HP ProLiant ML310e Gen8 Server prior to 12/12/2017\n - HPE ProLiant ML310e Gen8 v2 Server prior to 12/12/2017\n - HP ProLiant DL160 Gen8 Server prior to 12/12/2017\n - HP ProLiant SL270s Gen8 Server prior to 12/12/2017\n - HP ProLiant SL250s Gen8 Server prior to 12/12/2017\n - HP ProLiant SL230s Gen8 Server prior to 12/12/2017\n - HP ProLiant DL560 Gen8 Server prior to 12/12/2017\n - HPE ProLiant SL210t Gen8 Server prior to 12/12/2017\n - HP ProLiant DL580 Gen8 Server prior to 12/12/2017 (v1.98)\n - HP ProLiant ML10 Server prior to 12/12/2017\n - HP ProLiant m710 Server Cartridge prior to 12/12/2017 (v1.60)\n - HPE Synergy Composer prior to 12/12/2017\n - HPE Integrity Superdome X with BL920s Blades prior to 8.8.6\n - HPE Superdome Flex Server prior to 2.3.110\n - HP ProLiant DL360 Gen9 Server prior to v2.54\n - HPE Synergy 620 Gen9 Compute Module prior to v2.54\n - HPE ProLiant Thin Micro TM200 Server prior to 1/16/2017\n - HPE ProLiant ML350 Gen10 Server prior to v1.28\n - HP ProLiant BL420c Gen8 Server prior to 12/12/2017\n - HPE ProLiant ML10 v2 Server prior to 12/12/2017\n - HPE ProLiant MicroServer Gen8 prior to 12/12/2017\n - HPE Synergy 660 Gen10 Compute Module prior to v1.28\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2017-5715\n 8.2 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N\n 6.8 (AV:A/AC:L/Au:N/C:C/I:P/A:N)\n\n CVE-2017-5753\n 5.0 CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L\n 5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)\n\n CVE-2017-5754\n 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE has made the following system ROM updates which include an updated\nmicrocode to resolve the vulnerability:\n\n * HPE has provided a customer bulletin\n\u003chttps://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us\u003e\nwith specific instructions to obtain the udpated sytem ROM\n \n - Note:\n \n + CVE-2017-5715 requires that the System ROM be updated and a vendor\nsupplied operating system update be applied as well. \n + For CVE-2017-5753, CVE-2017-5754 require only updates of a vendor\nsupplied operating system. \n + HPE will continue to add additional products to the list. Not all\nlisted products have updated system ROMs yet. Impacted products awaiting\nsystem ROM updates are marked TBS (to be supplied). \n\nHISTORY\n\nVersion:1 (rev.1) - 4 January 2018 Initial release\n\nVersion:2 (rev.2) - 5 January 2018 Added additional impacted products\n\nVersion:3 (rev.3) - 10 January 2018 Added more impacted products\n\nVersion:4 (rev.4) - 9 January 2018 Fixed product ID\n\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to [email protected]. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: [email protected]\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. Summary\n\n VMware Virtual Appliance updates address side-channel analysis due\n to speculative execution\n\n Note:\n\n This document will focus on VMware Virtual Appliances which are\n affected by the known variants of CVE-2017-5753, CVE-2017-5715, and\n CVE-2017-5754. For more information please see Knowledge Base article \n 52264. \n \n These mitigations are part of the Operating System-Specific\n Mitigations category described in VMware Knowledge Base article\n 52245. Relevant Products\n\n vCloud Usage Meter (UM)\n Identity Manager (vIDM)\n vCenter Server (vCSA)\n vSphere Data Protection (VDP)\n vSphere Integrated Containers (VIC)\n vRealize Automation (vRA)\n\n3. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the identifiers CVE-2017-5753 (Bounds Check bypass),\n CVE-2017-5715 (Branch Target Injection), CVE-2017-5754 (Rogue data\n cache load) to these issues. \n\n Column 5 of the following table lists the action required to\n mitigate the observed vulnerability in each release, if a solution\n is available. \n\n VMware Product Running Replace with/ Mitigation/\n Product Version on Severity Apply Patch Workaround\n ========== ========= ======= ========= ============= ==========\n UM 3.x VA Important Patch Pending KB52467\n\n vIDM 3.x, 2.x VA Important Patch Pending KB52284\n\n vCSA 6.5 VA Important Patch Pending KB52312\n vCSA 6.0 VA Important Patch Pending KB52312\n vCSA 5.5 VA N/A Unaffected None\n\n VDP 6.x VA Important Patch Pending None\n\n VIC 1.x VA Important 1.3.1 None\n\n vRA 7.x VA Important Patch Pending KB52377\n vRA 6.x VA Important Patch Pending KB52497\n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the checksum of your downloaded file. \n\n vSphere Integrated Containers 1.3.1\n Downloads and Documentation:\n https://my.vmware.com/group/vmware/get-download?downloadGroup=VIC131\n\n5. Change log\n\n 2018-02-08: VMSA-2018-0007\n Initial security advisory in conjunction with the release of vSphere\n Integrated Containers 1.3.1 on 2018-02-08. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n [email protected]\n [email protected]\n [email protected]\n\n E-mail: security at vmware.com\n PGP key at: https://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Support Phases\n https://www.vmware.com/support/policies/lifecycle.html\n \n VMware Security \u0026 Compliance Blog \n https://blogs.vmware.com/security\n\n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2018 VMware Inc. All rights reserved. 6.4) - x86_64\n\n3. \n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a commonly\nused performance optimization). There are three primary variants of the\nissue which differ in the way the speculative execution can be exploited. \n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. Please\nrefer to References section for further information about this issue and\nthe performance impact. \n\nIn this update mitigations for x86-64 architecture are provided. \n\nVariant CVE-2017-5753 triggers the speculative execution by performing a\nbounds-check bypass. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nand guest/host boundaries and read privileged memory by conducting targeted\ncache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors,\nduring speculative execution of instruction permission faults, exception\ngeneration triggered by a faulting access is suppressed until the\nretirement of the whole instruction block. In a combination with the fact\nthat memory accesses may populate the cache even when the block is being\ndropped and never committed (executed), an unprivileged local attacker\ncould use this flaw to read privileged (kernel space) memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue. \n\nRed Hat would like to thank Google Project Zero for reporting these issues. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201804-08\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: QEMU: Multiple vulnerabilities\n Date: April 08, 2018\n Bugs: #629348, #638506, #643432, #646814, #649616\n ID: 201804-08\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in QEMU, the worst of which\nmay allow an attacker to execute arbitrary code. \n\nBackground\n==========\n\nQEMU is a generic and open source machine emulator and virtualizer. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-emulation/qemu \u003c 2.11.1-r1 \u003e= 2.11.1-r1 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in QEMU. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nAn attacker could execute arbitrary code, cause a Denial of Service\ncondition, or obtain sensitive information. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll QEMU users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-emulation/qemu-2.11.1-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2017-13672\n https://nvd.nist.gov/vuln/detail/CVE-2017-13672\n[ 2 ] CVE-2017-15124\n https://nvd.nist.gov/vuln/detail/CVE-2017-15124\n[ 3 ] CVE-2017-16845\n https://nvd.nist.gov/vuln/detail/CVE-2017-16845\n[ 4 ] CVE-2017-17381\n https://nvd.nist.gov/vuln/detail/CVE-2017-17381\n[ 5 ] CVE-2017-18030\n https://nvd.nist.gov/vuln/detail/CVE-2017-18030\n[ 6 ] CVE-2017-18043\n https://nvd.nist.gov/vuln/detail/CVE-2017-18043\n[ 7 ] CVE-2017-5715\n https://nvd.nist.gov/vuln/detail/CVE-2017-5715\n[ 8 ] CVE-2018-5683\n https://nvd.nist.gov/vuln/detail/CVE-2018-5683\n[ 9 ] CVE-2018-5748\n https://nvd.nist.gov/vuln/detail/CVE-2018-5748\n[ 10 ] CVE-2018-7550\n https://nvd.nist.gov/vuln/detail/CVE-2018-7550\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201804-08\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\[email protected] or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2018 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. \n\nSoftware Description:\n- webkit2gtk: Web content engine library for GTK+\n\nDetails:\n\nIt was discovered that speculative execution performed by modern CPUs\ncould leak information through a timing side-channel attack, and that\nthis could be exploited in web browser JavaScript engines. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to obtain sensitive information from other\ndomains, bypassing same-origin restrictions", "sources": [ { "db": "NVD", "id": "CVE-2017-5715" }, { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" }, { "db": "PACKETSTORM", "id": "145711" }, { "db": "PACKETSTORM", "id": "146772" }, { "db": "PACKETSTORM", "id": "145718" }, { "db": "PACKETSTORM", "id": "146007" }, { "db": "PACKETSTORM", "id": "145964" }, { "db": "PACKETSTORM", "id": "145937" }, { "db": "PACKETSTORM", "id": "145809" }, { "db": "PACKETSTORM", "id": "146308" }, { "db": "PACKETSTORM", "id": "145674" }, { "db": "PACKETSTORM", "id": "145651" }, { "db": "PACKETSTORM", "id": "147100" }, { "db": "PACKETSTORM", "id": "145654" }, { "db": "PACKETSTORM", "id": "145852" } ], "trust": 3.42 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-113918", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-113918" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5715", "trust": 3.0 }, { "db": "CERT/CC", "id": "VU#584653", "trust": 1.9 }, { "db": "CERT/CC", "id": "VU#180049", "trust": 1.9 }, { "db": "BID", "id": "102376", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "155281", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "145645", "trust": 1.1 }, { "db": "SECTRACK", "id": "1040071", "trust": 1.1 }, { "db": "LENOVO", "id": "LEN-18282", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "43427", "trust": 1.1 }, { "db": "CERT@VDE", "id": "VDE-2018-003", "trust": 1.1 }, { "db": "CERT@VDE", "id": "VDE-2018-002", "trust": 1.1 }, { "db": "SIEMENS", "id": "SSA-608355", "trust": 1.1 }, { "db": "USCERT", "id": "TA18-141A", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-00302", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "145852", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "146308", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "145964", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "146772", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "145809", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "146019", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145844", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146026", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146014", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146298", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145767", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146301", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146018", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149917", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146009", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146556", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148260", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145769", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146016", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150083", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145801", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146315", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148446", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146771", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146167", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146762", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147179", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145800", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147582", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145768", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146283", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146017", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146957", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145853", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146015", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145762", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146714", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146501", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-201801-152", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-113918", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145711", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145718", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146007", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145937", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145674", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145651", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147100", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145654", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" }, { "db": "PACKETSTORM", "id": "145711" }, { "db": "PACKETSTORM", "id": "146772" }, { "db": "PACKETSTORM", "id": "145718" }, { "db": "PACKETSTORM", "id": "146007" }, { "db": "PACKETSTORM", "id": "145964" }, { "db": "PACKETSTORM", "id": "145852" }, { "db": "PACKETSTORM", "id": "145937" }, { "db": "PACKETSTORM", "id": "145809" }, { "db": "PACKETSTORM", "id": "146308" }, { "db": "PACKETSTORM", "id": "145674" }, { "db": "PACKETSTORM", "id": "145651" }, { "db": "PACKETSTORM", "id": "147100" }, { "db": "PACKETSTORM", "id": "145654" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "id": "VAR-201801-0826", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" } ], "trust": 1.3670634874999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00302" } ] }, "last_update_date": "2024-11-29T22:18:52.979000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-203", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-113918" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "trust": 1.9, "url": "http://www.kb.cert.org/vuls/id/584653" }, { "trust": 1.8, "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/102376" }, { "trust": 1.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "trust": 1.6, "url": "https://support.apple.com//ht208394" }, { "trust": 1.6, "url": "http://www.dell.com/support/speculative-store-bypass" }, { "trust": 1.1, "url": "https://seclists.org/bugtraq/2019/jun/36" }, { "trust": 1.1, "url": "https://seclists.org/bugtraq/2019/nov/16" }, { "trust": 1.1, "url": "https://www.kb.cert.org/vuls/id/180049" }, { "trust": 1.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180104-cpusidechannel" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "trust": 1.1, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2018-001.txt" }, { "trust": 1.1, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "trust": 1.1, "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "trust": 1.1, "url": "https://aws.amazon.com/de/security/security-bulletins/aws-2018-013/" }, { "trust": 1.1, "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "trust": 1.1, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "trust": 1.1, "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "trust": 1.1, "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "trust": 1.1, "url": "https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes" }, { "trust": 1.1, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180002" }, { "trust": 1.1, "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "trust": 1.1, "url": "https://security.paloaltonetworks.com/cve-2017-5715" }, { "trust": 1.1, "url": "https://support.citrix.com/article/ctx231399" }, { "trust": 1.1, "url": "https://support.f5.com/csp/article/k91229003" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us" }, { "trust": 1.1, "url": "https://support.lenovo.com/us/en/solutions/len-18282" }, { "trust": 1.1, "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "trust": 1.1, "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "trust": 1.1, "url": "https://www.synology.com/support/security/synology_sa_18_01" }, { "trust": 1.1, "url": "https://www.vmware.com/security/advisories/vmsa-2018-0007.html" }, { "trust": 1.1, "url": "https://www.vmware.com/us/security/advisories/vmsa-2018-0002.html" }, { "trust": 1.1, "url": "https://www.vmware.com/us/security/advisories/vmsa-2018-0004.html" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4120" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4187" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4188" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4213" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/43427/" }, { "trust": 1.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-18:03.speculative_execution.asc" }, { "trust": 1.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-19:26.mcu.asc" }, { "trust": 1.1, "url": "https://security.gentoo.org/glsa/201810-06" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/145645/spectre-information-disclosure-proof-of-concept.html" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/155281/freebsd-security-advisory-freebsd-sa-19-26.mcu.html" }, { "trust": 1.1, "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "trust": 1.1, "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "trust": 1.1, "url": "https://spectreattack.com/" }, { "trust": 1.1, "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2018:0292" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1040071" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3531-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3531-3/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3540-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3541-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3542-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3549-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3560-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3561-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3580-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3581-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3581-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3582-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3582-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3594-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3597-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3597-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3620-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3690-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3777-3/" }, { "trust": 1.0, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03871en_us" }, { "trust": 1.0, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026languageid=en-fr" }, { "trust": 0.8, "url": "https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution" }, { "trust": 0.8, "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "trust": 0.8, "url": "https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ncas/alerts/ta18-141a" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/208.html" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf" }, { "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel" }, { "trust": 0.8, "url": "https://fortiguard.com/psirt/fg-ir-18-002" }, { "trust": 0.8, "url": "https://support.hp.com/us-en/document/c06001626" }, { "trust": 0.8, "url": "http://www.hitachi.com/hirt/publications/hirt-pub18001/" }, { "trust": 0.8, "url": "https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/" }, { "trust": 0.8, "url": "https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution" }, { "trust": 0.8, "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "trust": 0.8, "url": "https://www.suse.com/support/kb/doc/?id=7022937" }, { "trust": 0.8, "url": "https://www.synology.com/en-global/support/security/synology_sa_18_23" }, { "trust": 0.8, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/variant4" }, { "trust": 0.8, "url": "https://kb.vmware.com/s/article/54951" }, { "trust": 0.8, "url": "https://aws.amazon.com/security/security-bulletins/aws-2018-015/" }, { "trust": 0.7, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.7, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.7, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2017-5715" }, { "trust": 0.7, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.7, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.7, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.6, "url": "https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5715" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5753" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5754" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2017-5753" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2017-5754" }, { "trust": 0.2, "url": "https://access.redhat.com/solutions/3307851" }, { "trust": 0.2, "url": "https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-a00039267en_us\u003e" }, { "trust": 0.2, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026langu" }, { "trust": 0.2, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us" }, { "trust": 0.2, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.2, "url": "https://www.hpe.com/info/report-security-vulnerability" }, { "trust": 0.2, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.2, "url": "https://developer.arm.com/support/security-update\u003e" }, { "trust": 0.2, "url": "http://www.amd.com/en/corporate/speculative-execution\u003e" }, { "trust": 0.2, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499" }, { "trust": 0.1, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026amp;languageid=en-fr" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03871en_us" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0057" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3541-2," }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3523-2," }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.13.0-37.42~16.04.1" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3597-1," }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3597-2," }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0047" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0104" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/webkit2gtk/2.18.5-0ubuntu0.17.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/webkit2gtk/2.18.5-0ubuntu0.17.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/webkit2gtk/2.18.5-0ubuntu0.16.04.1" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3530-1" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0094" }, { "trust": 0.1, "url": "https://twitter.com/vmwaresrc" }, { "trust": 0.1, "url": "https://my.vmware.com/group/vmware/get-download?downloadgroup=vic131" }, { "trust": 0.1, "url": "https://kb.vmware.com/kb/52284" }, { "trust": 0.1, "url": "https://blogs.vmware.com/security" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "https://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "https://kb.vmware.com/kb/52377" }, { "trust": 0.1, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5753" }, { "trust": 0.1, "url": "https://kb.vmware.com/kb/52467" }, { "trust": 0.1, "url": "https://kb.vmware.com/kb/52312" }, { "trust": 0.1, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5754" }, { "trust": 0.1, "url": "https://lists.vmware.com/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "https://kb.vmware.com/kb/52264" }, { "trust": 0.1, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5715" }, { "trust": 0.1, "url": "https://kb.vmware.com/kb/52245" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/lifecycle.html" }, { "trust": 0.1, "url": "https://kb.vmware.com/kb/52497" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0038" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0018" }, { "trust": 0.1, "url": "https://security.gentoo.org/glsa/201804-08" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16845" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5683" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13672" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15124" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18030" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7550" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18043" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5748" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17381" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0020" } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" }, { "db": "PACKETSTORM", "id": "145711" }, { "db": "PACKETSTORM", "id": "146772" }, { "db": "PACKETSTORM", "id": "145718" }, { "db": "PACKETSTORM", "id": "146007" }, { "db": "PACKETSTORM", "id": "145964" }, { "db": "PACKETSTORM", "id": "145852" }, { "db": "PACKETSTORM", "id": "145937" }, { "db": "PACKETSTORM", "id": "145809" }, { "db": "PACKETSTORM", "id": "146308" }, { "db": "PACKETSTORM", "id": "145674" }, { "db": "PACKETSTORM", "id": "145651" }, { "db": "PACKETSTORM", "id": "147100" }, { "db": "PACKETSTORM", "id": "145654" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" }, { "db": "PACKETSTORM", "id": "145711" }, { "db": "PACKETSTORM", "id": "146772" }, { "db": "PACKETSTORM", "id": "145718" }, { "db": "PACKETSTORM", "id": "146007" }, { "db": "PACKETSTORM", "id": "145964" }, { "db": "PACKETSTORM", "id": "145852" }, { "db": "PACKETSTORM", "id": "145937" }, { "db": "PACKETSTORM", "id": "145809" }, { "db": "PACKETSTORM", "id": "146308" }, { "db": "PACKETSTORM", "id": "145674" }, { "db": "PACKETSTORM", "id": "145651" }, { "db": "PACKETSTORM", "id": "147100" }, { "db": "PACKETSTORM", "id": "145654" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-21T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-01-04T00:00:00", "db": "CNVD", "id": "CNVD-2018-00302" }, { "date": "2018-01-04T00:00:00", "db": "VULHUB", "id": "VHN-113918" }, { "date": "2018-01-06T17:59:57", "db": "PACKETSTORM", "id": "145711" }, { "date": "2018-03-15T15:54:52", "db": "PACKETSTORM", "id": "146772" }, { "date": "2018-01-06T18:01:06", "db": "PACKETSTORM", "id": "145718" }, { "date": "2018-01-22T03:15:00", "db": "PACKETSTORM", "id": "146007" }, { "date": "2018-01-18T20:41:22", "db": "PACKETSTORM", "id": "145964" }, { "date": "2018-01-12T01:15:52", "db": "PACKETSTORM", "id": "145852" }, { "date": "2018-01-17T04:04:00", "db": "PACKETSTORM", "id": "145937" }, { "date": "2018-01-11T02:31:24", "db": "PACKETSTORM", "id": "145809" }, { "date": "2018-02-08T23:33:33", "db": "PACKETSTORM", "id": "146308" }, { "date": "2018-01-05T00:37:28", "db": "PACKETSTORM", "id": "145674" }, { "date": "2018-01-04T17:50:36", "db": "PACKETSTORM", "id": "145651" }, { "date": "2018-04-09T16:31:30", "db": "PACKETSTORM", "id": "147100" }, { "date": "2018-01-04T17:51:10", "db": "PACKETSTORM", "id": "145654" }, { "date": "2018-01-04T13:29:00.227000", "db": "NVD", "id": "CVE-2017-5715" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-19T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-01-11T00:00:00", "db": "CNVD", "id": "CNVD-2018-00302" }, { "date": "2020-05-05T00:00:00", "db": "VULHUB", "id": "VHN-113918" }, { "date": "2024-11-21T03:28:16.943000", "db": "NVD", "id": "CVE-2017-5715" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks", "sources": [ { "db": "CERT/CC", "id": "VU#180049" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "info disclosure", "sources": [ { "db": "PACKETSTORM", "id": "145964" }, { "db": "PACKETSTORM", "id": "145809" } ], "trust": 0.2 } }
var-201906-0914
Vulnerability from variot
Improper permissions in the installer for Intel(R) Turbo Boost Max Technology 3.0 driver version 1.0.0.1035 and before may allow an authenticated user to potentially enable escalation of privilege via local access. A local attacker can exploit this issue to gain elevated privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0914", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "thinkstation p410", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "thinkstation p910", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "thinkstation p710", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "turbo boost max technology 3.0", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "1.0.0.1035" }, { "model": "thinkstation p510", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "3.01.0.0.1035" } ], "sources": [ { "db": "BID", "id": "108770" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0164" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marius Gabriel Mihai.", "sources": [ { "db": "BID", "id": "108770" }, { "db": "CNNVD", "id": "CNNVD-201906-532" } ], "trust": 0.9 }, "cve": "CVE-2019-0164", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2019-0164", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-140195", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.3, "id": "CVE-2019-0164", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0164", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-532", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-140195", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140195" }, { "db": "CNNVD", "id": "CNNVD-201906-532" }, { "db": "NVD", "id": "CVE-2019-0164" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permissions in the installer for Intel(R) Turbo Boost Max Technology 3.0 driver version 1.0.0.1035 and before may allow an authenticated user to potentially enable escalation of privilege via local access. \nA local attacker can exploit this issue to gain elevated privileges", "sources": [ { "db": "NVD", "id": "CVE-2019-0164" }, { "db": "BID", "id": "108770" }, { "db": "VULHUB", "id": "VHN-140195" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0164", "trust": 2.8 }, { "db": "BID", "id": "108770", "trust": 2.0 }, { "db": "LENOVO", "id": "LEN-27841", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-532", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140195", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140195" }, { "db": "BID", "id": "108770" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-532" }, { "db": "NVD", "id": "CVE-2019-0164" } ] }, "id": "VAR-201906-0914", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140195" } ], "trust": 0.4481968833333333 }, "last_update_date": "2024-11-23T20:41:24.920000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140195" }, { "db": "NVD", "id": "CVE-2019-0164" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/108770" }, { "trust": 2.0, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "trust": 1.7, "url": "https://support.lenovo.com/us/en/product_security/len-27841" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/zh/product_security/len-27841" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140195" }, { "db": "BID", "id": "108770" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-532" }, { "db": "NVD", "id": "CVE-2019-0164" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140195" }, { "db": "BID", "id": "108770" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-532" }, { "db": "NVD", "id": "CVE-2019-0164" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140195" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108770" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-532" }, { "date": "2019-06-13T16:29:00.840000", "db": "NVD", "id": "CVE-2019-0164" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-02T00:00:00", "db": "VULHUB", "id": "VHN-140195" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108770" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-532" }, { "date": "2024-11-21T04:16:23.300000", "db": "NVD", "id": "CVE-2019-0164" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108770" }, { "db": "CNNVD", "id": "CNNVD-201906-532" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-532" } ], "trust": 0.6 } }
var-201906-1235
Vulnerability from variot
Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1235", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11128" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-553" } ], "trust": 0.6 }, "cve": "CVE-2019-11128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11128", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142743", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-11128", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-11128", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-553", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142743", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11128", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "CNNVD", "id": "CNNVD-201906-553" }, { "db": "NVD", "id": "CVE-2019-11128" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11128", "trust": 2.9 }, { "db": "BID", "id": "108766", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-553", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142743", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11128", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-553" }, { "db": "NVD", "id": "CVE-2019-11128" } ] }, "id": "VAR-201906-1235", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142743" } ], "trust": 0.8407131071428573 }, "last_update_date": "2024-11-23T20:14:03.913000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel NUC Kit Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93786" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "NVD", "id": "CVE-2019-11128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 1.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-553" }, { "db": "NVD", "id": "CVE-2019-11128" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-553" }, { "db": "NVD", "id": "CVE-2019-11128" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142743" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11128" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-553" }, { "date": "2019-06-13T16:29:01.543000", "db": "NVD", "id": "CVE-2019-11128" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142743" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11128" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-553" }, { "date": "2024-11-21T04:20:35.003000", "db": "NVD", "id": "CVE-2019-11128" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-553" } ], "trust": 0.6 } }
var-201906-1231
Vulnerability from variot
Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. A buffer overflow vulnerability exists in the system firmware in IntelNUCKit. This vulnerability is caused when the network system or product performs operations on the memory and does not correctly verify the data boundary, resulting in incorrect read and write operations to other associated memory locations. This vulnerability can be exploited to cause buffer overflows or heap overflows. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1231", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kits", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11124" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-555" } ], "trust": 0.6 }, "cve": "CVE-2019-11124", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11124", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2019-25504", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142739", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-11124", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-11124", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-25504", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-555", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142739", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11124", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULHUB", "id": "VHN-142739" }, { "db": "VULMON", "id": "CVE-2019-11124" }, { "db": "CNNVD", "id": "CNNVD-201906-555" }, { "db": "NVD", "id": "CVE-2019-11124" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. A buffer overflow vulnerability exists in the system firmware in IntelNUCKit. This vulnerability is caused when the network system or product performs operations on the memory and does not correctly verify the data boundary, resulting in incorrect read and write operations to other associated memory locations. This vulnerability can be exploited to cause buffer overflows or heap overflows. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2019-11124" }, { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142739" }, { "db": "VULMON", "id": "CVE-2019-11124" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11124", "trust": 3.5 }, { "db": "BID", "id": "108766", "trust": 2.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-555", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25504", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142739", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11124", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULHUB", "id": "VHN-142739" }, { "db": "VULMON", "id": "CVE-2019-11124" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-555" }, { "db": "NVD", "id": "CVE-2019-11124" } ] }, "id": "VAR-201906-1231", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULHUB", "id": "VHN-142739" } ], "trust": 1.4411795225000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" } ] }, "last_update_date": "2024-11-23T20:43:43.088000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "IntelNUCKit Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/172797" }, { "title": "Intel NUC Kit Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93788" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULMON", "id": "CVE-2019-11124" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-555" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142739" }, { "db": "NVD", "id": "CVE-2019-11124" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 2.3, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULHUB", "id": "VHN-142739" }, { "db": "VULMON", "id": "CVE-2019-11124" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-555" }, { "db": "NVD", "id": "CVE-2019-11124" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULHUB", "id": "VHN-142739" }, { "db": "VULMON", "id": "CVE-2019-11124" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-555" }, { "db": "NVD", "id": "CVE-2019-11124" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25504" }, { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142739" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11124" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-555" }, { "date": "2019-06-13T16:29:01.387000", "db": "NVD", "id": "CVE-2019-11124" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25504" }, { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142739" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11124" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-555" }, { "date": "2024-11-21T04:20:34.530000", "db": "NVD", "id": "CVE-2019-11124" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-555" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-555" } ], "trust": 0.6 } }
var-201906-0920
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. An input validation error vulnerability exists in the authentication process in Intel Open CIT. A local attacker could exploit this vulnerability to elevate privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0920", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0177" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "cve": "CVE-2019-0177", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-0177", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140208", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2019-0177", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0177", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-567", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140208", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140208" }, { "db": "CNNVD", "id": "CNNVD-201906-567" }, { "db": "NVD", "id": "CVE-2019-0177" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. An input validation error vulnerability exists in the authentication process in Intel Open CIT. A local attacker could exploit this vulnerability to elevate privileges", "sources": [ { "db": "NVD", "id": "CVE-2019-0177" }, { "db": "VULHUB", "id": "VHN-140208" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0177", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-567", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140208", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140208" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-567" }, { "db": "NVD", "id": "CVE-2019-0177" } ] }, "id": "VAR-201906-0920", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140208" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T19:38:08.612000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140208" }, { "db": "NVD", "id": "CVE-2019-0177" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140208" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-567" }, { "db": "NVD", "id": "CVE-2019-0177" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140208" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-567" }, { "db": "NVD", "id": "CVE-2019-0177" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140208" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-567" }, { "date": "2019-06-13T16:29:00.983000", "db": "NVD", "id": "CVE-2019-0177" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140208" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-567" }, { "date": "2024-11-21T04:16:24.920000", "db": "NVD", "id": "CVE-2019-0177" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-567" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-567" } ], "trust": 0.6 } }
var-201906-0922
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security feature issue vulnerability exists in Intel Open CIT where the program does not adequately protect passwords. An attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0922", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0179" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:accelerated_storage_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:chipset_device_software", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_card_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:compute_stick_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i3", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:core_i5", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:core_x-series", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:omni-path_fabric_manager_gui", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:pentium", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:intel:raid_web_console_3", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_dcap_linux_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:sgx_linux_client_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:turbo_boost_max_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:xeon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:ite_tech_consumer_infrared_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:open_cloud_integrity_technology", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:openattestation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "cve": "CVE-2019-0179", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-0179", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140210", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "[email protected]", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2019-0179", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "[email protected]", "id": "CVE-2019-0179", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-566", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140210", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140210" }, { "db": "CNNVD", "id": "CNNVD-201906-566" }, { "db": "NVD", "id": "CVE-2019-0179" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security feature issue vulnerability exists in Intel Open CIT where the program does not adequately protect passwords. An attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-0179" }, { "db": "VULHUB", "id": "VHN-140210" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0179", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-566", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140210", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140210" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-566" }, { "db": "NVD", "id": "CVE-2019-0179" } ] }, "id": "VAR-201906-0922", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140210" } ], "trust": 0.35292397 }, "last_update_date": "2024-11-23T20:20:52.770000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140210" }, { "db": "NVD", "id": "CVE-2019-0179" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140210" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-566" }, { "db": "NVD", "id": "CVE-2019-0179" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140210" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-566" }, { "db": "NVD", "id": "CVE-2019-0179" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140210" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-566" }, { "date": "2019-06-13T16:29:01.060000", "db": "NVD", "id": "CVE-2019-0179" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140210" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-566" }, { "date": "2024-11-21T04:16:25.153000", "db": "NVD", "id": "CVE-2019-0179" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-566" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-566" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*", "matchCriteriaId": "8F249992-79C7-4005-9804-97FFFAC658E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*", "matchCriteriaId": "81C6DAFF-FD39-434C-8426-4BE5F39355EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*", "matchCriteriaId": "2EE259EF-22F6-4AA1-BDF6-448E15B96F14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*", "matchCriteriaId": "EFED12C9-2563-4036-BEBC-DD9D67095917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*", "matchCriteriaId": "18155178-43F1-48A6-AC0E-9578031F7F04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*", "matchCriteriaId": "4C47688B-1D40-4D73-B363-E2E8230588FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*", "matchCriteriaId": "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*", "matchCriteriaId": "72BF929E-1288-448A-83A4-D26D86D26EF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*", "matchCriteriaId": "C8E4CB07-1768-4C18-ACAD-73773042C752", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "31465D8E-A705-4AE3-AB2A-C296554E514C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*", "matchCriteriaId": "D8B2D356-DD32-46E0-9459-67E10AE44104", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*", "matchCriteriaId": "27CDF6AC-7356-417F-84F6-33E9E3AA2082", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*", "matchCriteriaId": "E8E6F0AF-78AC-4257-9164-A9A4CCA05968", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*", "matchCriteriaId": "5DA61740-3E29-4820-9897-9BCB90490D49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*", "matchCriteriaId": "633350BA-34B4-4927-82B9-B44D1286D8FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*", "matchCriteriaId": "D2E687A6-87AA-4F3A-98AB-A164EC0EE051", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*", "matchCriteriaId": "53A8F993-32F4-487A-A33D-814BCDF1FAB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*", "matchCriteriaId": "09EC7A10-C2AB-4DD4-9C75-073344F635E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*", "matchCriteriaId": "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*", "matchCriteriaId": "0C83B3D2-E293-4D33-AE5B-1789466696DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*", "matchCriteriaId": "CB399F3F-7C6E-463E-B822-A4365A4C290A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*", "matchCriteriaId": "F5175C41-110B-4C26-80CB-C25DA11F639B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*", "matchCriteriaId": "63DAF721-A7E8-4263-869D-D9E100D7C598", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*", "matchCriteriaId": "F79057F7-72D3-4176-BBDD-E9A362153E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*", "matchCriteriaId": "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*", "matchCriteriaId": "FD65648B-B7DB-432F-8F88-6C624F94F809", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*", "matchCriteriaId": "7A949D34-E086-4821-B73A-DCCFDD6C5616", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*", "matchCriteriaId": "93055544-064D-46FE-92E4-48F69DDD29B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*", "matchCriteriaId": "9A98184C-18F5-424C-BB74-9A8094B5992C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*", "matchCriteriaId": "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*", "matchCriteriaId": "3EB52214-6E22-49BF-B2F6-0AA282108E0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*", "matchCriteriaId": "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*", "matchCriteriaId": "F8E0DA72-76B5-4022-BBFA-B886F0F662CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*", "matchCriteriaId": "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*", "matchCriteriaId": "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*", "matchCriteriaId": "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*", "matchCriteriaId": "0F67F016-A068-4079-AAE5-B247BBAE1B2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*", "matchCriteriaId": "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*", "matchCriteriaId": "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*", "matchCriteriaId": "DD57E072-FF46-4637-B7CF-D6C2F3BA8782", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*", "matchCriteriaId": "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*", "matchCriteriaId": "4B18E14C-4DC4-4AEB-8792-968D893BA402", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*", "matchCriteriaId": "B706F7E4-8169-48A5-86D1-3592D3D9B845", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*", "matchCriteriaId": "808DAAA6-9047-49A1-BC0B-9D4725299CA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*", "matchCriteriaId": "57EFA3F2-5C76-48AF-931F-7463633370A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF59F0-9F30-448F-A109-B90FCC513CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*", "matchCriteriaId": "07EFB7B3-772A-476D-B30F-2A442F64928F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*", "matchCriteriaId": "41A69B9F-EF79-4642-A2A8-75395AD7506E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*", "matchCriteriaId": "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*", "matchCriteriaId": "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*", "matchCriteriaId": "6C6D7877-1990-481F-9CFF-81A2BD39DA6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*", "matchCriteriaId": "6A17D56F-D53C-4198-B7EF-95BAA4711B3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*", "matchCriteriaId": "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*", "matchCriteriaId": "E13892FB-C1D0-4C46-A171-9D055E58DE0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*", "matchCriteriaId": "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*", "matchCriteriaId": "DB830245-29AF-4F0E-9C12-6BED7E76609D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*", "matchCriteriaId": "17ACD170-347E-4DF5-AE0D-DF00854480A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*", "matchCriteriaId": "3B8BCF08-D863-435F-9E70-78C7542A3C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*", "matchCriteriaId": "9E57F037-EE11-4148-A214-0650A98A07F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*", "matchCriteriaId": "F641F2A7-64C7-43DB-862B-B7117E1B9CBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*", "matchCriteriaId": "51086E20-8A3D-4A68-8048-D385865D50FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*", "matchCriteriaId": "2621BF41-EFD1-4C8A-9426-A937B68DC71E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*", "matchCriteriaId": "713DC902-5264-42CB-BB22-3566A4528FED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*", "matchCriteriaId": "28554810-9989-47B2-9CF1-E421D534777E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*", "matchCriteriaId": "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*", "matchCriteriaId": "4DD23345-C583-4E30-A9FE-B0C485606ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*", "matchCriteriaId": "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*", "matchCriteriaId": "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*", "matchCriteriaId": "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*", "matchCriteriaId": "E8BBEBBD-8F88-474B-A40B-7270B500AAC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*", "matchCriteriaId": "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*", "matchCriteriaId": "7471E5CD-7211-474C-856F-51C199479407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*", "matchCriteriaId": "E785FA6F-A7BE-46A3-B384-029E55793DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A4148-B91B-4799-B055-21F4A7FA74A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*", "matchCriteriaId": "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*", "matchCriteriaId": "353E8397-B63B-4879-9D3D-610F65929184", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*", "matchCriteriaId": "D91D2C07-10D0-49F0-B353-19E34C438CEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*", "matchCriteriaId": "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*", "matchCriteriaId": "F18363D9-C7D8-4C9F-9A50-33725FFE6558", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*", "matchCriteriaId": "267E5275-7D50-4EF6-AB1D-7ECA894ED71B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*", "matchCriteriaId": "06B91A77-76F0-41CA-B23B-69F431F0D1AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*", "matchCriteriaId": "D9F01332-C259-4F3B-ABE9-C34DAC18FC18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*", "matchCriteriaId": "B9EA80D9-6A3B-42AF-B609-7429755BE504", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*", "matchCriteriaId": "40B500EC-20B8-42D2-A5DF-956C96FBEB12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*", "matchCriteriaId": "D55B01E2-6783-494E-BCB9-C75D2CA042D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*", "matchCriteriaId": "8D31A976-9C00-42AC-8DA1-D8B39564F456", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*", "matchCriteriaId": "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*", "matchCriteriaId": "A90F5756-47A1-4512-848E-3070E42506EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*", "matchCriteriaId": "FDB161B7-D329-41FB-97C3-2C1EB16F74C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*", "matchCriteriaId": "923D2D73-F953-44D2-9A25-E118136E8C5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*", "matchCriteriaId": "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*", "matchCriteriaId": "AE2AEDB1-8C35-4210-B045-69216480B384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*", "matchCriteriaId": "484C1B49-7D90-4360-BE33-C1DAB755ED89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*", "matchCriteriaId": "C08FE92E-D97F-40E1-8482-1DA777EBC785", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*", "matchCriteriaId": "2EBD6720-F788-4FD7-BC7F-AAEFAA137486", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*", "matchCriteriaId": "08032549-991F-465D-8794-21C8ED2C98D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*", "matchCriteriaId": "94514F41-CDCF-4EED-896E-8B5AE7360F0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*", "matchCriteriaId": "27F79141-5702-4157-8D13-FFB1C2F23FA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*", "matchCriteriaId": "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*", "matchCriteriaId": "FF8D239C-B3D6-4F08-AF99-E64752B72346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*", "matchCriteriaId": "207507FE-1DC7-4569-A5A9-392290622EC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*", "matchCriteriaId": "15FC32E2-9228-4903-9F0A-AF327A1C2D36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*", "matchCriteriaId": "FF50D5C4-DFC1-4306-B2C8-09D6788904FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*", "matchCriteriaId": "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*", "matchCriteriaId": "62783CBF-1299-4045-A0D9-E95E7B385164", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*", "matchCriteriaId": "3B04C754-50CD-4C8C-B56F-A50944EE5799", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*", "matchCriteriaId": "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*", "matchCriteriaId": "23BA712E-4516-4823-8E85-6AC24BE3240F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*", "matchCriteriaId": "7C1303D7-33B3-48AA-BD62-74984AD22AF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", "matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", "matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", "matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", "matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", "matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", "matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", "matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", "matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", "matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", "matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", "matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", "matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", "matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", "matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", "matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*", "matchCriteriaId": "8E0195D5-380D-401F-92EB-37AEA34E7478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*", "matchCriteriaId": "0E6AB8D9-FEA0-4830-941B-A2605830ADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", "matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", "matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", "matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", "matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", "matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", "matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", "matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", "matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", "matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", "matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", "matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", "matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", "matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", "matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", "matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", "matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", "matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*", "matchCriteriaId": "E40BD777-F766-4921-951C-7E38575ADA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", "matchCriteriaId": "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*", "matchCriteriaId": "55B1DB28-A0BE-40C5-BA4D-50354A085893", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*", "matchCriteriaId": "47859796-AA68-4E49-A625-9CBB49E5967A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*", "matchCriteriaId": "7FB51313-4B56-4045-A5A9-A2F2C1D21548", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*", "matchCriteriaId": "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*", "matchCriteriaId": "719CAF85-B1F1-4BF9-9217-6181339B20A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*", "matchCriteriaId": "F908E2B8-B4A1-487A-820D-57B1AC437754", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*", "matchCriteriaId": "ACDAC96E-D749-47E0-8DE4-BA0C74027330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*", "matchCriteriaId": "461A6DF4-EC6D-4DC8-A474-B219AE372FA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*", "matchCriteriaId": "60B23D94-D9F7-4EDE-9641-CE5670EB78C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*", "matchCriteriaId": "6F03C408-C457-4306-B26B-D21056B57AB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*", "matchCriteriaId": "2FB20448-852D-4B59-9517-DCF738140F79", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*", "matchCriteriaId": "5D2A6907-9CE2-465C-89EA-F1B84B31768D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*", "matchCriteriaId": "B3420C39-8177-445E-8501-49A4ED3998BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*", "matchCriteriaId": "049D03CC-7D4A-4D64-A3F4-0138717433CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*", "matchCriteriaId": "ACED82AA-7C7D-4089-9129-579CC6B063FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*", "matchCriteriaId": "24761232-F2C3-421D-A6AB-6FC100FE9B1D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*", "matchCriteriaId": "AAC00AAC-243D-437D-B613-1CF97CA58253", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*", "matchCriteriaId": "832281CF-98D7-42FF-8CF1-97632F8F7834", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*", "matchCriteriaId": "AE46D028-025E-4D37-9DF6-9BF385246923", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*", "matchCriteriaId": "3462E847-5100-4C4E-AE79-81D2857280AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D80BA-B6EE-451A-9D40-808B20E7B17A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*", "matchCriteriaId": "A65D4242-CBA6-413D-846C-72772C96E14D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*", "matchCriteriaId": "238B7D82-E552-46D5-9F66-1363F1610BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*", "matchCriteriaId": "6424D4A6-732D-4D4E-B099-E38FBFE1CF38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*", "matchCriteriaId": "177CA640-399E-4343-8DBB-E105E188CE3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*", "matchCriteriaId": "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*", "matchCriteriaId": "8C43C5A6-31B6-4946-90DA-60BBBA03861D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*", "matchCriteriaId": "CE15099D-6718-4AF8-BA3B-57DE1FE71289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*", "matchCriteriaId": "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*", "matchCriteriaId": "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*", "matchCriteriaId": "2B1BE9EE-4403-4983-89CD-A85C77846861", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*", "matchCriteriaId": "D28279AE-D876-4692-A54B-01CCD57AB61D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*", "matchCriteriaId": "E947FE61-02BA-46DB-AD95-692E33F74E6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*", "matchCriteriaId": "BD67AE51-56B8-473E-B5A3-89753D98481B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*", "matchCriteriaId": "47FC1445-5032-4BF1-9A1E-AF078BAC7676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*", "matchCriteriaId": "84181B90-DEEB-4291-86F7-7C65B51FBBEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*", "matchCriteriaId": "5A72734A-69D0-4FD8-95E8-997BC06B9676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*", "matchCriteriaId": "92C1C2B4-0431-48B9-AEA9-F6925268DE92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*", "matchCriteriaId": "A15B8BA9-3C75-492F-8105-C5F563653A1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*", "matchCriteriaId": "D670832E-8CB5-4861-8001-2E317CE7526C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*", "matchCriteriaId": "05DEAC21-5D6B-4224-BC50-54368CD9ECA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*", "matchCriteriaId": "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*", "matchCriteriaId": "6213C0D4-B0F4-4156-A467-4F29FA0E6093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*", "matchCriteriaId": "4288A260-F478-46A2-B18D-BD9CD797FE5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*", "matchCriteriaId": "159865EE-8852-4CBE-A3E3-D97C0D9CD89A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*", "matchCriteriaId": "1479FE1F-882C-4EA3-A05B-B5901D14D9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*", "matchCriteriaId": "BD701852-1959-429B-A631-2FE8390FFA31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*", "matchCriteriaId": "F687C73A-35F2-45A2-91E6-A43DCFAD463F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*", "matchCriteriaId": "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*", "matchCriteriaId": "02D3D433-30D2-4EBB-869A-79BB4B0AA879", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*", "matchCriteriaId": "D4701873-F7AA-40B8-AFD9-4A60D118574E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*", "matchCriteriaId": "77447A8E-7EAA-47A2-BA7A-434F7111693B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*", "matchCriteriaId": "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*", "matchCriteriaId": "777E076D-285A-4CA5-8886-080BD505DB42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*", "matchCriteriaId": "4FC42173-AD0A-40F4-8ECC-17B815F047B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*", "matchCriteriaId": "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*", "matchCriteriaId": "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*", "matchCriteriaId": "F8CE80B4-02EE-4CF5-B944-860AB16BADC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*", "matchCriteriaId": "BACC17D3-E255-4CCD-86BD-AADC9EC48E80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", "matchCriteriaId": "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", "matchCriteriaId": "580DF3D2-C365-43AF-9A48-F173072AA40B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", "matchCriteriaId": "32AD0A43-28BF-48F4-B363-F7A3A1BFE296", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", "matchCriteriaId": "9A747F9D-9761-4B8E-B01C-42018B25245A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", "matchCriteriaId": "DDA4CA91-DA96-4466-8969-3570C8E4343A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", "matchCriteriaId": "ECF29446-F253-438C-B1EA-B606186855FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", "matchCriteriaId": "C08277EA-676A-4D45-B66D-2488308CDEEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*", "matchCriteriaId": "994C51C8-AD87-4CDB-8EBD-4488D7604BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el manipulador de eventos en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x y 11.x podr\u00eda permitir que un atacante provoque una denegaci\u00f3n de servicio (DoS) mediante la misma subred." } ], "id": "CVE-2018-3629", "lastModified": "2024-11-21T04:05:48.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }, "published": "2018-07-10T21:29:00.887", "references": [ { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:active_management_technology_software_development_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "96787585-3353-4CAD-8144-D2886BB0A90F", "versionEndExcluding": "16.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:setup_and_configuration_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "63D5A750-B008-4170-A408-FFD2003CEEC1", "versionEndExcluding": "12.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:management_engine_bios_extension:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E7375A9-173A-4B7B-8D22-83882B3C595C", "versionEndExcluding": "15.0.0.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE930AA-59F7-43A7-9FF3-363CE72A6728", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D67C6D6B-12F3-43A6-BB8D-DFE0B6483294", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*", "matchCriteriaId": "96F1DD9B-C078-41C5-88E0-DB7705E17742", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BCD8EB-D71A-4BD6-8D2D-AF2430F840C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE366EB3-BE96-4A01-9BD5-792B59163938", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*", "matchCriteriaId": "89563A0F-CE7A-41C5-A8C7-9FC2D40F000A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:management_engine_bios_extension:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FB669F8-3DE9-4D9F-8F98-79472C322E45", "versionEndExcluding": "14.0.0.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFB47F1D-AE3D-4F0E-AEFE-879140B47DD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE191F8B-AC43-431E-87F7-46E2EF211D27", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C530D5AA-7480-45A7-BF06-45BF95B96B22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D7E83B0-4902-40CF-9B24-3358846186E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*", "matchCriteriaId": "61E425A8-F0F9-4C38-B199-0A410F0D0270", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F945B90-257C-4DCB-9CB3-F34C6F6529D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5AE97F1-0236-4305-BC0B-253160262125", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*", "matchCriteriaId": "8621ECA8-A467-471E-A871-72EDD10BB2FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*", "matchCriteriaId": "D16ACC77-CE53-4897-BEF8-50CFE7AD56FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:management_engine_bios_extension:*:*:*:*:*:*:*:*", "matchCriteriaId": "92FDB20F-9263-4E79-BA55-61D9D26BDA7E", "versionEndExcluding": "12.0.0.0011", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7FDE41F-FF2A-42F0-AF4D-F57A28E377F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AB420EA-D647-4272-8A96-2A09E70FAEAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6910BDD0-4968-45AE-AD19-3A1206F5D068", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C91CFB-C318-4F06-9A01-DCCEE2E901B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5C0F89F-0C58-44B8-A02C-50A97B086659", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:cm246:-:*:*:*:*:*:*:*", "matchCriteriaId": "246F7FE9-0B21-4947-B6C2-6CA2DB1D7817", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g_:-:*:*:*:*:*:*:*", "matchCriteriaId": "74DB5608-BEAB-4080-BD40-76C2FFB4DDCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD09C370-3A22-4AFD-89D7-C35B152C4DE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:management_engine_bios_extension:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2A24727-D111-4937-BFF8-6C9651C9D420", "versionEndExcluding": "11.0.0.0012", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4A62BA8-3AE3-4339-97D3-4768A122C71C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2CDBC2-2B45-4E22-845A-EB8415D4C56D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c232:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3CC679-8CEE-41F9-8DD0-4B5B02D7BBF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c236:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D02651A-0F34-476D-B049-72C872464FC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c422:-:*:*:*:*:*:*:*", "matchCriteriaId": "095F8957-9499-475C-8D68-A07A1140A4DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B9B4AE9-72ED-43CB-9705-ED6BDD80AEC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2364774-DA5C-48BF-AEDB-E97BFED643F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*", "matchCriteriaId": "C51E9A02-E6FC-42AD-8269-07EFEFD2ADD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*", "matchCriteriaId": "92911979-A714-4643-AF03-64EDBD42DFF5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*", "matchCriteriaId": "79973EAB-9106-4417-88AF-8AC368E58050", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBB31B9D-05BC-4D0E-8CC8-52757131A6CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*", "matchCriteriaId": "C518A082-388F-4DDE-8FDF-FEA95FD69B49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BBE62C7-76BD-4684-8CDE-68DBFF4E5280", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA2DAF1D-8994-491E-BD65-642C23778DB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0DA068-0D77-4358-BDEE-572811836689", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8B0316B-1968-4502-955D-78E9BDC2E30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:cm236:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAA5A85C-17B0-490F-853F-3451D2406F47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:cm238:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1CA8160-27AD-4390-AF99-82CF31DDE94F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g_:-:*:*:*:*:*:*:*", "matchCriteriaId": "74DB5608-BEAB-4080-BD40-76C2FFB4DDCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*", "matchCriteriaId": "09271283-1681-4EB4-8BD3-DE01674D4D19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B23A6C6-89CF-42CA-A3D0-E17EB8104BBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*", "matchCriteriaId": "2715B64C-204D-4243-944E-434FDA366AA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A05885-8AFD-4FFA-BE18-9CE24A1427B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7BB0694-7F15-4784-97AA-9E9783B3702C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E4C9D1-C1E8-43E1-88B8-76637A991EB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E68EB4-7634-42AB-8DCD-8C87C86F78E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E0469E-FFC6-46BF-BB03-34326D1DBE19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*", "matchCriteriaId": "955612CC-223F-47C0-9D75-D71A39E61A3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", "matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", "matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", "matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", "matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", "matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", "matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", "matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", "matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", "matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", "matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", "matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", "matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", "matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", "matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", "matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100b:*:*:*:*:*:*:*", "matchCriteriaId": "A4360390-55D1-4A41-9098-37712566C5B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8145ue:*:*:*:*:*:*:*", "matchCriteriaId": "579C9E23-F17B-4606-8684-2713F62ED6B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDE0D-D1A2-4068-ACCB-1DF26931FE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75921058-8E13-460F-9F74-AF9C21DF353A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CDD752C-BE5E-4EE7-9541-CAE85E5E237A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1000ng4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "070EC3E9-B224-49F4-94D5-8A18AD47EBDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E40B89C2-49CD-4216-9D4C-79695698EAAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71EE1DE3-2F84-481A-BE31-7FDF4B4E76C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7E2359B-38A9-4962-B819-1C438390BF81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABA80297-A747-45A0-81EA-2367F2D88053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F751905-287E-47EA-93B8-2BA576052AAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "128AF2E8-0FDD-42FA-9F3A-7939E1D06389", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6BFE70F-8E5F-46C8-8675-3D5C114BF98A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16E324A6-6F59-47A2-A941-3CEB70F5B70D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73917CEB-A661-4E21-ADB5-2F7C545F937A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBB644F0-D66B-4CE6-96A5-5AE895FC0315", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A88A42CB-3AD3-4621-AA0D-F24636DA9903", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD66BFB8-0725-408E-B7C8-9EE2FB5EE1CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E80BB84A-3BF8-40E0-BB06-FD39C583B94B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A589B59-DB9C-427F-A28A-BFD01EC64997", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F33FA193-AA3B-439D-94D4-060172C7D371", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE22EAE0-A356-4194-9287-FE70FCE16135", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59FECACD-46EF-4DBE-ACA9-D0FB9311FCF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BE6184E-9929-4F23-8834-9B0E15A4131D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6544E460-1B23-43B5-92A4-13CF61AF08A2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A6228E-13A2-47CF-87B4-CB34A1FA4B10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_8100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A5EC446-14DA-4B35-ACB5-7942F2D8E5EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CCEDC1E-D090-4528-93E7-F10A4A157903", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_8100f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECAF36BC-313B-4874-9BF3-E6B79845E3CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_8100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "76659D14-67EB-4570-B18F-8054DC49B22A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_8100t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A128656-0DF5-48FD-AE8A-B1F3E5DE9105", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B23442-3009-40DE-8C9A-B0FB16BD2178", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_8300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FEAF0C4-1882-4A01-BBBC-A4FD27C441EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AFFA071-138D-4538-B809-72380B072899", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_8300t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D32FA30-E036-4B8C-A469-7D267A253BEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B0830A0-9398-4886-8604-EEFAD40D0453", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_8350k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "508E9BD1-41FE-45FD-BD3B-1054405EA600", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "873C5935-533E-4A71-9871-FBDA99BC1B83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_9100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A658E4CB-915B-4132-8330-9951C56F5B0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "E280CDC9-5AC0-4EA8-B1F8-C6D8A14FD444", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_9100f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C1600C3-0C9E-4ED6-AD2B-C9F20F6DDAA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_9100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E72867-C6C3-4E90-8E0D-39C8AE5E15D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_9100t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "692290E7-CA4C-4347-B49E-E4865C2479A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_9100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "764E99C4-6E89-450F-B1B3-97F235911460", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_9300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FEA6EB0-ACCC-493A-938B-6EA53724181E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BA26068-CF24-4373-8BAA-28A0B652D48D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_9300t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ECB60B9-3889-47EB-9129-873516375E7E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_9300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "89B3CFF2-81F6-4462-B9CA-D740378FA35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_9320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC71B90E-8CD2-4E7A-A399-D437A4C84FA8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_9320:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB904621-1216-4C11-A86E-336ACB80F0DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_9350k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7A796D7-1FB4-4580-97EE-FEE0E7D817BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_9350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "D644F64A-FEA4-464A-BFBC-7B27DFAA5763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3_9350kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA1E75CC-9139-4631-A36E-F64328E7519A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_9350kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80D2A9-B009-4084-BB66-B65FEB55D4E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", "matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", "matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", "matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", "matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", "matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", "matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", "matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", "matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", "matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", "matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", "matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", "matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", "matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", "matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", "matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", "matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", "matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*", "matchCriteriaId": "2A645E70-B00F-4EE8-9C06-B6382791637A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8210y:*:*:*:*:*:*:*", "matchCriteriaId": "97193D6C-50C9-4215-9061-658D16B51FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8257u:*:*:*:*:*:*:*", "matchCriteriaId": "8C276436-2421-44F8-B0C9-B208D3E21D62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8365u:*:*:*:*:*:*:*", "matchCriteriaId": "F3A862B8-6A19-4F35-AC67-DAE6027C39B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8365ue:*:*:*:*:*:*:*", "matchCriteriaId": "57F70FC6-CFA8-455A-8C5E-B51560079B08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7BB208-57EF-4B6B-88E5-FAFDDAF1E68C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5\\+8400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DB5F890-8B92-4F12-8D34-7E9045D22DAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5\\+8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2816803A-2A97-48B2-ACB5-BA35FC6CD82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5\\+8500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25773AA8-5882-4C05-9A67-FE0D37C9DCAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5\\+8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDF4BEEF-A8FA-4A9A-A906-20268F7886C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F130A798-2FCC-43DB-9A42-367C4BB580E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BFF15A-0C78-45BC-8E71-EDF624AC162D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D72A6E-AAEA-49A8-92D8-FFED7220E263", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16920A34-D1CE-4F1A-BCF7-045E3B3AA9AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D188A7A-9456-4535-A230-C16033A22F21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F542B269-6281-47C4-86CE-72BC9180D90E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F74DD9E-0D1F-44B9-B3CB-7F85F4E540B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "646F0510-9532-466C-B43B-8E869384A52E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1030ng7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA03DCF-A603-41F8-A38B-6757BFA270FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7824FB5D-4401-4785-BD6D-4A8E67434217", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D96CA5B1-ED93-4423-9C4C-EFCB3F63767A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95BC9762-7F9A-483A-8C20-94481FD54000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "502AE808-A66F-4C02-A112-C4D682F3E13F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5071EBE4-CC92-4238-A23E-0213CB14E19A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70EC3730-5825-422D-A728-D719F447E5E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "530E334B-4B32-4F96-B67B-194A7B46E0E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06ECE587-9DC0-4989-97AC-DD2B7EEAE7D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DA87ECA-F5EC-42A5-8A43-6D47242A2756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E3F8BD6-027E-4A6A-B7FC-99443BC13A71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "255A4636-57B9-491E-B213-02E3B4EFB6B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "150F855A-EC0D-483F-99A8-DDD33AAE1F92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "497FAB39-DA53-4447-B1FC-144C725135D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2115591-782B-492C-9A43-1EF612309E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BC109D-F210-4BB0-80B1-BC877F322E9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFA43369-7A3F-45F4-B45C-0435499336CF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "388D5427-0439-4F89-9D80-3AEDB853B2CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5E50D6E-C759-46F4-A794-5DD83E971BD4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79AA0B0A-19E2-4F4B-B1E1-09F4DFED737B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21EAC0D6-D5E2-42D6-B105-BCF09C35BC09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3548B071-7C6E-402D-8292-84E1400BDC07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10610u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB122B67-2D59-445D-855E-6C79A385DE08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "208BA1E9-0EB2-4DA9-A7F3-0BB3D2DFE32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_10110y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "194A2080-4E05-4D88-B2C4-7D974B74257F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDEA7E62-9E59-4936-8D43-680765E0AAA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_10210y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40732967-A9AC-4163-9293-4697C97FAD91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "27760A66-839C-47CA-BC64-6F22F35FCAAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_10310y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2035334-A6F1-4E8F-942B-50CA2980842E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "01A8FF32-1DC9-4513-B492-5D32A543F31C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_8400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "94EC7546-1FBA-4612-BF34-A7DEEC6092BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "8519F788-4422-4D12-AD34-7F2FC84A8F4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_8400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF6FD312-0236-483C-BD7E-BD06296F0F97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "01C22B03-00B3-4089-8D57-798C1193597B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_8500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3915E7A-C8C1-4026-A6CF-BC6B21D9000C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "95295D93-EB33-47AD-B132-576623086FAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_8500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A11F0DC-E5A9-4360-8ABE-08903443D248", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5606CCF0-454C-48F2-9073-85EEAE24A35E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_8600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B4CFC13-CEDD-4B65-ADDB-2B333CA096B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "A953CAF6-93FF-4E7E-BD35-0032A2C68C87", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_8600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3B065C8-32B5-47DC-B45D-FDD1F19B7354", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0379716-C812-479A-A2E3-335AA69932A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_8600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3667F63D-9B34-4BE4-AB70-8A292B7D3CDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B60F2B9-0A4C-44AC-85B9-54302DCEDF34", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_9400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A7516F9-6904-44FE-AEC6-B9AE84DDF9DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA8492FE-8B9D-43BA-80D1-608720B83B56", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_9400f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "50E05869-2D2B-4C4F-A5C8-AD002C0BA051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_9400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "82039F74-BE0C-43B5-BE08-5D09147E3DE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_9400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC5CBA2-D778-43EA-A5F5-17CAB4EFC3D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_9400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6569E8E-5D81-4DE2-9BD2-D17466F9C993", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_9500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C434AD5A-FC85-4078-ABFE-7742EF567DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "892F53CC-4113-45D1-8693-F98DE00641D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_9500f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FDD0621-DE08-4A4E-A040-7DD78007C742", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_9500f:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AC5E270-73AB-440C-BA1B-1D9CCDEE9F7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_9500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "109ED922-0AE1-4A25-A8AC-43174E6F39CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_9500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "30420C2D-F3BE-4D5C-B7CE-04B68F54C437", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_9600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74D8FDA5-3015-4111-A284-863164355982", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_9600:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA935504-E306-407F-83D3-5100CB4932DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_9600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C47A4105-6C0E-4002-8BAB-99C746FAA9AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_9600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B303953A-487F-45A8-B584-EDE0ED77EA69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_9600kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7924E05C-5826-4A94-81C0-011887301972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_9600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "96D61995-CB46-403F-9A8D-B3F1D6A75E02", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_9600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FFDF761-524C-4E78-B4F3-D3BBF6005EED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_9600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C85318F0-C2F5-443E-BF09-4641CD6CE3C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_l16g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5028F02B-62A0-4F27-A551-1138DACF0BDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CBFEB46-F34E-4A5B-BC67-9248C777EB7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5_m480_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F913384D-A489-448D-8CED-8B01463C2412", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5_m480:-:*:*:*:*:*:*:*", "matchCriteriaId": "E92B12C0-E86A-44A0-B302-3CE721237726", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*", "matchCriteriaId": "AEB59CA7-8335-43F6-A410-DF7BD12855FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*", "matchCriteriaId": "C39ED459-DE01-4037-A01F-C13BD2E36508", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*", "matchCriteriaId": "93396E3B-72F7-4BDA-A872-3E0DE12884C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8557u:*:*:*:*:*:*:*", "matchCriteriaId": "6B771584-91DC-49FD-B6EE-0B641704A6C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8569u:*:*:*:*:*:*:*", "matchCriteriaId": "B8F65B17-1221-48EB-8F9F-473110089F3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8665u:*:*:*:*:*:*:*", "matchCriteriaId": "BCE057B1-5E4B-4D5A-807A-485545416B92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8665ue:*:*:*:*:*:*:*", "matchCriteriaId": "8A0E7E92-CE45-48F4-B258-3AA177D3D9A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:10510u:*:*:*:*:*:*:*", "matchCriteriaId": "EB911A1E-4637-4911-A338-3F0C3B90807E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:10510y:*:*:*:*:*:*:*", "matchCriteriaId": "FB497777-8D0E-41C8-ADF2-18413F695B58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E1357B-B236-403A-BCE1-AA3EF08C0298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:10710u:*:*:*:*:*:*:*", "matchCriteriaId": "5E98A49F-A94E-4CC9-BB40-DB9AE61664C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6BDE7D-711D-42F6-97EC-5A0E84BEB07F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D449326-502E-488D-9933-863B9CF997FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E24442-6697-4D2D-9515-43E4370474B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FED7ED67-CE89-4585-A146-E9B1C5CFFCCD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1060ng7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C92A3211-DD20-49BA-A1DA-615D823A42A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C752B58-0750-4487-845B-9D657079BDED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F807F51-D647-4867-BBDA-17492346EB64", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA13A2D-14CE-4C48-A746-E6068BA343EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFA2457A-D89A-4F3E-95D3-3C839F3C0365", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4A6D39D-7897-48E4-BEB3-7D71E8E42EEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95AC35A3-6F6D-4F61-872E-6E73F958449B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DD3DB08-E718-4A66-A1AC-B31FA97E42C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E029771-4205-49E6-9635-E03A66F877FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D9D6D38-180E-4CD1-B6A6-765E67DF97B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D41E4EDE-51B2-4618-AD9B-AEDF07D47775", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E7092CF-E482-4103-8AF9-A4C19238F9D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B232700-BC3E-49B0-9814-FB37958B6CBD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85113D54-52E5-4372-8FD5-DC37DCBE9DA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "215576B4-3ABA-4F65-8DA4-F07C1750C99B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EBEEB17-29AB-4F3A-A0CC-68386A315050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA7D248-0833-44D6-81A6-FFD24E54AE80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_10510y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DDA6F78-51F7-4068-BAEB-2448F5B2C225", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CB005BC-621D-4D46-B91F-EF82BCE2C379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_1060g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6EC641C-2BA9-4E4A-8F1C-C4E681FA1074", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBD04BA0-473B-48E7-B56C-76DDD4024811", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_1060ng7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FB7CE6-E636-4EC9-8F2A-263F033423DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_1060ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FC29A35-EF34-4034-A119-CA44E458A195", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_1065g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89B2D0BF-0F5C-4485-8AED-812FF26E6C56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "C837421F-9FB6-4A8E-9267-7064CE199BF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_1068ng7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C008C6F-F3F1-4F71-B949-1F571F7E75EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_1068ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AAD2BFC-DDD7-4B14-9D5E-144F701BD3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_8086k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4E6ADB0-84DB-4415-B48F-2171B178DA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "98D04BB8-B9C1-46F8-8A1D-1958B9BBC403", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_8500y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7769223-9697-44EC-9A84-C4029D8380B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "83E1898A-EE76-4BEB-8BDB-7107C2B4835A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_8550u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "045482EE-B81C-4841-8A13-F5DF9B84E639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EBCF3D9-761E-4951-8040-363C168CE24D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_8559u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CFFA03F-371A-44D1-B81E-135E5DBE6FA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "18AD0F7E-91C5-42B3-B373-38EDCC51BFDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_8560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF15268E-C72C-44C7-BEBE-30BF7CC21D6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_8560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7883B77-C055-4D3F-B614-B0F37E9A3AA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_8565u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0F1FB03-B303-4F05-A6C0-F20641CD9889", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D366BB-469B-4F3C-A778-901B45B99D06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_8650u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87580C9D-8F2A-4BE7-839A-1D7E693D72A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "742C479E-F736-4C7B-9D03-4690C7E8CA86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_8700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3493E8C1-0396-4488-8E04-B2A16BCF0447", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD561718-500D-404A-849F-5194EFD83DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_8700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AACC745C-92B7-4AD2-A7EE-8F4F4DD361D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "32FF6953-96D7-4CDB-A2C1-D0FC8B21195C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_8700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72443A3A-E33D-4C0A-9D58-87A1DD44BEF9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0136220-738E-44D1-B2E6-B2E98D9DA36E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_9700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "341D7B5A-6C90-4BC6-8D22-EB6E4336917E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E971296-E033-4B15-9D46-BC44D0060412", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_9700f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1214A845-DB95-4247-8C6E-41207FC8C4D7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_9700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA34B5AA-F1D9-4F05-9B45-496B7DD3F671", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_9700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7220DDF2-C6E6-42AC-B2BC-D8BFC9B3BD25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_9700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02EEC32-F9AD-4454-A4C9-79F57DE68618", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_9700kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BBB4037-A04A-42CE-A97D-21A1EAF116B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_9700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "58383912-CAD9-415A-B81D-3CB6B19FE777", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7_9700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6582B389-339B-4967-96C6-5C4320F2D3FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7_9700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE5B4FF9-F099-4640-AAEE-89A0C8FB2103", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FDBA26-526D-42D5-8CD3-A1600CFC23C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9:7900x:*:*:*:*:*:*:*", "matchCriteriaId": "986C4DC7-2CFD-4ED9-867C-C55EA068BA47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FDBA26-526D-42D5-8CD3-A1600CFC23C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9:7920x:*:*:*:*:*:*:*", "matchCriteriaId": "663B49AA-2AF5-4271-AE31-9C3C1F5A4FC8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FDBA26-526D-42D5-8CD3-A1600CFC23C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9:7940x:*:*:*:*:*:*:*", "matchCriteriaId": "B90A4FE6-0501-479B-9566-3FA9923864C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FDBA26-526D-42D5-8CD3-A1600CFC23C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9:7960x:*:*:*:*:*:*:*", "matchCriteriaId": "91D65DF6-512E-4BFF-ACC1-61F3DE7AE467", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FDBA26-526D-42D5-8CD3-A1600CFC23C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9:7980xe:*:*:*:*:*:*:*", "matchCriteriaId": "849419E5-59E0-4CB5-9ED0-F38653013626", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FDBA26-526D-42D5-8CD3-A1600CFC23C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", "matchCriteriaId": "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10850h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADB36606-33D0-42DF-A7B5-ED4E5E7061A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48C9306-80AD-40CC-9516-E1B6F5A63556", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E412013-D537-4E86-AA5C-08016531405E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8CF9E46-7F23-4910-B09C-E2BADDC793B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19B82BF5-F105-4686-A352-6BDD7FB2DC57", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF885F34-941A-4147-B755-3260A22A6825", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97C04E06-708E-4103-9238-A7451189DBB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6428C73-6A64-4619-983F-3871B4CE1472", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "576C6801-0DBF-4D1C-B5CF-55E25BDFFD11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "465D3B92-2BC3-4F0A-A792-564361B2A1EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "916A238A-64B9-483C-A0FB-8144B4D5EFFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BE472FC-4776-4FD1-AE36-3D9934A60BB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10910_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5351528-6FC1-4CA4-82E8-BC252A950B34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52310FF-8235-4081-B679-CA56C0361B1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "470B28CA-4990-4AF8-9CF5-C2A1B037FFA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F8E079-4941-4878-8DC3-4B74BD832724", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7A147E8-0778-49CE-92EF-ED1950138528", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4648D9A9-4050-4753-A7B3-E56C0F7E22F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF8583AC-0D66-466C-8024-15A520803534", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DFC6D19-9E02-4DE5-818F-931779A41F74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E714DE6-C7C7-44B9-B824-7FF85DA89A86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FED84E6-8E54-4630-9D95-FD2F8EDF4C89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E89BBE4-2243-4AF5-A63C-4BD45C62C446", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAC07903-D4B7-423F-9F79-7DF45E5350BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC956D6E-B4D0-44F0-BE83-6BCCE5ECC480", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE0A0913-B424-4E2B-A553-E40218BA1030", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA65F0A9-8BBE-4674-86B8-894484DC6C88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCB18769-9DDD-4321-B123-BFF81A02DA4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A66250BC-0338-40E8-9E9F-706F2DA5E5AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B32C5EE-D845-471C-85EA-DA5F9B04F01B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "14E48F04-9B55-4162-BB28-07FFD3D5194D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93CC48C-DCCB-442A-98D5-3165CCFAE7F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A727A1-219F-4B78-B490-0E47340B38F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D267F336-7023-4DA3-A481-0F6F8A44290C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA036BD6-38AF-4763-9B84-8CD7019BF262", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9D4C3C-BD9C-4AF1-92BF-127D9A6B7B44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE70578-1EC4-4A02-95F7-5A23B76E1BEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*", "matchCriteriaId": "5598510F-1057-4DB6-838C-8945FB6978DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8063AB-7D2C-4005-863F-A8BD612B430B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E50CC66-0FC3-4825-B677-EBF34D6804B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "655E770E-B9EE-4B08-B1EE-F393C7F68941", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "10A12922-9D6D-49E8-B9C6-DD74CD60FAFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC47200-8F3F-4969-AABA-39F4B1E4E263", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "165E3D96-24EA-4F47-9692-30823C482BF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB17629-2454-478B-8E1A-AC2D2FC2233C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86ACD76-A1A6-4B99-A521-38C706AF2EDF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD455EBB-69AE-464A-93AA-13227FBD17E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B82BAF85-06A9-4AEE-94D2-3CAF4607623E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "2534F0E2-C427-4514-AE51-26EB0872B519", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_9880h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D8773D3-8EAD-4440-8225-C26940F169FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9_9880h:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7576A0D-9BC0-45FC-8F61-CF4DD473FCBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_9900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3A50BC6-9010-409C-A49D-1478A5C6A232", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9_9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "E67CC06F-CD6F-4A52-AE31-B857F31BAEBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_9900k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D9DD5A5-4D41-485A-9BA4-823BB4537DFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9_9900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B29FBC6-ABAA-4651-989D-1D8DE3ACD591", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_9900kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F4173A6-441C-4C96-9DCC-2BDF8A3561D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9_9900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BC9A9B0-89BB-45AA-9567-2A10282806E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_9900ks_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57765909-0FC5-4725-84F1-7B76D50507B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9_9900ks:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B98F76F-B3C3-459F-80F0-F7D3EED64F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_9900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29D687AA-23EB-49C2-A0EC-3AFF7DA4C6C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9_9900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "477DCC2F-611F-4C63-BCA2-B58476CF8188", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9_9980hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "367B61C3-10FF-45E5-B7E7-F5D8F4273575", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9_9980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "31EB8B5B-BC35-4FE3-A116-2E93A49B79F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71189D33-0B4B-4E1C-B395-E2888BE068D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", "matchCriteriaId": "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71189D33-0B4B-4E1C-B395-E2888BE068D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", "matchCriteriaId": "580DF3D2-C365-43AF-9A48-F173072AA40B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71189D33-0B4B-4E1C-B395-E2888BE068D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", "matchCriteriaId": "32AD0A43-28BF-48F4-B363-F7A3A1BFE296", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71189D33-0B4B-4E1C-B395-E2888BE068D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", "matchCriteriaId": "9A747F9D-9761-4B8E-B01C-42018B25245A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71189D33-0B4B-4E1C-B395-E2888BE068D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", "matchCriteriaId": "DDA4CA91-DA96-4466-8969-3570C8E4343A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71189D33-0B4B-4E1C-B395-E2888BE068D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", "matchCriteriaId": "ECF29446-F253-438C-B1EA-B606186855FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71189D33-0B4B-4E1C-B395-E2888BE068D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", "matchCriteriaId": "C08277EA-676A-4D45-B66D-2488308CDEEB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71189D33-0B4B-4E1C-B395-E2888BE068D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*", "matchCriteriaId": "994C51C8-AD87-4CDB-8EBD-4488D7604BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access." }, { "lang": "es", "value": "Unas credenciales insuficientemente protegidas en el aprovisionamiento USB para Intel(R) AMT SDK versiones anteriores a 16.0.3, Intel(R) SCS versiones anteriores a 12.2 e Intel(R) MEBx versiones anteriores a 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 y 15.0.0.0004, pueden permitir a un usuario no autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de acceso f\u00edsico" } ], "id": "CVE-2021-33107", "lastModified": "2025-05-05T17:17:09.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-02-09T23:15:15.387", "references": [ { "source": "[email protected]", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html" }, { "source": "[email protected]", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "[email protected]", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "matchCriteriaId": "CD028C10-FD07-4206-A732-CCAC1B6D043D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "matchCriteriaId": "704FAA50-1B7D-4917-AC4A-4C58785340F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "matchCriteriaId": "5C6B95D3-75BD-4826-BFBE-9701CC0FF052", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "matchCriteriaId": "F66E31A6-EA01-40C8-8718-CE2C1F45EEB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "matchCriteriaId": "DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "matchCriteriaId": "022F2CBE-EFB1-4962-AC91-D25AAB057DAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "matchCriteriaId": "69C05CD9-551B-46EE-85F8-D18FF878FE8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "matchCriteriaId": "2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "matchCriteriaId": "3C38C609-242E-4923-A81F-DAFBE7B6A927", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "matchCriteriaId": "A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "matchCriteriaId": "8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "matchCriteriaId": "D7AC7C56-2205-4121-99E2-001A7488E0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "matchCriteriaId": "A1677313-FF8F-493B-9DA3-C78F87581A17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "matchCriteriaId": "4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "matchCriteriaId": "85CA4444-5103-4451-8A7C-F6BBE714BBB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "matchCriteriaId": "FA1EB745-46D7-4088-93C6-E7156520B144", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "matchCriteriaId": "A93010C0-33B3-438F-94F6-8DA7A9D7B451", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "matchCriteriaId": "2A988A78-6B3D-4599-A85C-42B4A294D86D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "matchCriteriaId": "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "matchCriteriaId": "246AA1B0-B6C8-406B-817D-26113DC63858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "matchCriteriaId": "00EE5B42-FF05-447C-BACC-0E650E773E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "matchCriteriaId": "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "matchCriteriaId": "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "matchCriteriaId": "5D616C72-0863-478C-9E87-3963C83B87E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "matchCriteriaId": "CC333B0D-3A0E-4629-8016-68C060343874", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "matchCriteriaId": "6655535C-FF64-4F9E-8168-253AABCC4F5D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "matchCriteriaId": "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "matchCriteriaId": "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "matchCriteriaId": "1EACEF19-83BC-4579-9274-BE367F914432", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "matchCriteriaId": "24128A7F-2B0B-4923-BA9E-9F5093D29423", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "matchCriteriaId": "0990DD71-9E83-499D-9DAF-A466CF896CFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "matchCriteriaId": "9B7FEDEF-9772-4FB1-9261-020487A795AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "matchCriteriaId": "FE7B0F72-DEDF-40C4-887C-83725C52C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "matchCriteriaId": "9568C222-9816-4520-B01C-C1DC2A79002D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "matchCriteriaId": "53A1F23D-7226-4479-B51F-36376CC80B04", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*", "matchCriteriaId": "BAB245C8-9918-41A0-9DFB-A11E4185C87A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*", "matchCriteriaId": "9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*", "matchCriteriaId": "F752A3C8-18ED-4765-B6EC-C664154EB701", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*", "matchCriteriaId": "B4F31C3F-7C0D-4D95-B4B9-89FD38076913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*", "matchCriteriaId": "5BEEE36E-E735-4A33-80B7-9407D072F6BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*", "matchCriteriaId": "2CB3D3DE-21BE-40C7-A510-AC97C92390DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*", "matchCriteriaId": "0D9A9545-38A3-460D-AB1A-8B03BEB405A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*", "matchCriteriaId": "1860D932-777D-41F2-94A2-D14AB1494AA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*", "matchCriteriaId": "75165A10-2FD5-4370-814C-B60FDE339AFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*", "matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "matchCriteriaId": "65AAC7A7-77CA-4C6C-BD96-92A253512F09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "matchCriteriaId": "FCD16C07-0050-495A-8722-7AC46F5920F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "matchCriteriaId": "01423706-C82C-4457-9638-1A2380DE3826", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "matchCriteriaId": "A881E2D3-A668-465F-862B-F8C145BD5E8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "matchCriteriaId": "3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "matchCriteriaId": "4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "matchCriteriaId": "6602DD69-E59A-417D-B19F-CA16B01E652C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "matchCriteriaId": "05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "matchCriteriaId": "40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "matchCriteriaId": "ED96AC16-12CC-43F6-ACC8-009A06CDD8F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "matchCriteriaId": "2CE9DC29-C192-4553-AF29-D39290976F47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "matchCriteriaId": "F625E647-B47E-404C-9C5B-72F3EB1C46F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "matchCriteriaId": "E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "matchCriteriaId": "B5878612-9825-4737-85A5-8227BA97CBA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "matchCriteriaId": "F453D348-28CE-402B-9D40-A29436A24ECC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "matchCriteriaId": "36322F4B-83D7-468A-BB34-1C03729E9BF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "matchCriteriaId": "0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "matchCriteriaId": "A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2A50E-94FA-44E9-A45D-3016750CFBDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "matchCriteriaId": "5625CAD8-4A62-4747-B6D9-90E56F09B731", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "matchCriteriaId": "43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "matchCriteriaId": "78DE1A01-3AEF-41E6-97EE-CB93429C4A1D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "matchCriteriaId": "410184AF-B932-4AC9-984F-73FD58BB4CF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "matchCriteriaId": "B265F073-9E0A-4CA0-8296-AB52DEB1C323", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "matchCriteriaId": "3F664223-1CBC-4D8A-921B-F03AACA6672B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "matchCriteriaId": "987A8470-08BA-45DE-8EC0-CD2B4451EECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "matchCriteriaId": "8BBC9542-FB77-4769-BF67-D42829703920", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "matchCriteriaId": "74FDC18B-4662-422E-A86A-48FE821C056F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "matchCriteriaId": "CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "matchCriteriaId": "CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*", "matchCriteriaId": "78E4461B-72F8-4F3D-A405-4AFA99EC8A32", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*", "matchCriteriaId": "663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*", "matchCriteriaId": "DAEDED56-9387-4DAC-BF52-C32ECCB7D407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*", "matchCriteriaId": "FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*", "matchCriteriaId": "E57A9B28-734B-401D-B24C-A295F364D8E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*", "matchCriteriaId": "F02289DF-4A02-4602-89B7-E9148236EE1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "matchCriteriaId": "723E7155-493D-4B5A-99E2-AB261838190E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "matchCriteriaId": "82E37264-E4BA-4D9D-92E7-56DE6B5F918F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "matchCriteriaId": "8704BE6D-2857-4328-9298-E0273376F2CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*", "matchCriteriaId": "731F1E65-1D53-443B-8E2F-8AF11191AFA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*", "matchCriteriaId": "02A83822-822D-4A4D-B29B-A5BE6367A7DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*", "matchCriteriaId": "E8C32738-F08E-469C-8DE0-2708F30574A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*", "matchCriteriaId": "B292187E-8EAD-49D2-B469-B14CA0656035", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*", "matchCriteriaId": "C7D131E1-24C1-48CF-B3DD-46B09A718FB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*", "matchCriteriaId": "0ABF1231-73CF-4D1B-860C-E76CD26A645E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*", "matchCriteriaId": "F7F88E38-4EC4-41DB-A59D-800997440C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*", "matchCriteriaId": "32FD6647-4101-4B36-9A9A-F70C29997148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*", "matchCriteriaId": "D248D668-A895-43B3-ADEF-1B22EE7DC76E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*", "matchCriteriaId": "858411B5-E904-45FA-8B33-5CC73B915B22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*", "matchCriteriaId": "6BB9336C-C893-4AB0-9402-868CE9960058", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*", "matchCriteriaId": "A4695F94-7AAE-4219-9EF6-CE6D0838192D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*", "matchCriteriaId": "BD7A0991-73F0-410D-855C-BFC88A66E61F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*", "matchCriteriaId": "FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*", "matchCriteriaId": "9858EAC3-C1CE-449B-A605-FFA337DA825D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*", "matchCriteriaId": "E7A8F905-A4C6-4EC6-B9E8-800948350B89", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*", "matchCriteriaId": "565B48E3-1406-4E3C-B4A5-35865C5614E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*", "matchCriteriaId": "46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*", "matchCriteriaId": "8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*", "matchCriteriaId": "191A094B-E354-4767-AD43-87CE140BF851", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "matchCriteriaId": "C1289B9E-5725-42EF-8848-F545421A29E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*", "matchCriteriaId": "238A21CB-F8C5-468B-B523-6D014E2EA8AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*", "matchCriteriaId": "0DC52CDD-614D-4EA0-8DA8-D71189C42E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*", "matchCriteriaId": "A3A630E1-6CAE-4809-AB18-5002F158AE90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*", "matchCriteriaId": "A67750FF-EF4B-414F-8ED4-299CAF33B0DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*", "matchCriteriaId": "5A82D885-82F5-4755-BC11-5899E28CEE42", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "matchCriteriaId": "88AF1366-8A14-4741-8146-886C31D8D347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*", "matchCriteriaId": "7FD75301-E29C-47DC-B53F-DC44EA0C1885", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*", "matchCriteriaId": "8C944024-BEAA-43AF-A339-FD69C75E8240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*", "matchCriteriaId": "435C69D1-3932-4379-8D18-B1E12D558325", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*", "matchCriteriaId": "3572B700-73C0-41D1-95FD-FE9D5B0C1F80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*", "matchCriteriaId": "97A40DC9-0D4E-4C91-8D1B-3CED95B3952E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*", "matchCriteriaId": "16FB3E4B-05F8-411A-8C86-4ACE03815553", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*", "matchCriteriaId": "8E55EBC1-6F96-47CD-9503-7855EFB07240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*", "matchCriteriaId": "4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*", "matchCriteriaId": "F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*", "matchCriteriaId": "A1789924-FADB-4076-8874-120B29EE6B86", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*", "matchCriteriaId": "BC246667-2F6F-4024-9EAA-2CE3018235C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*", "matchCriteriaId": "B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*", "matchCriteriaId": "1341A5D4-A5CE-4D31-A178-01C3069D7A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*", "matchCriteriaId": "86A5C199-92E5-435C-AC40-175849285104", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*", "matchCriteriaId": "67589F54-0A54-4DE7-9A47-A73DD05F7965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*", "matchCriteriaId": "DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*", "matchCriteriaId": "8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*", "matchCriteriaId": "92C5DC8C-3318-440B-8B29-4827F343927B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*", "matchCriteriaId": "0ECC47D8-F602-4CEA-B19A-209CE76C9D36", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*", "matchCriteriaId": "7514ADD3-DECC-4CC2-9421-A609E526FDC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*", "matchCriteriaId": "691097C3-F91B-499B-BAEB-4E7E9C43B517", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*", "matchCriteriaId": "0B3DB1ED-017B-43EF-92A3-A8A88669FBC2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*", "matchCriteriaId": "19A49AAF-0F08-4151-8F74-4EF9C3415B00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "3F7A2018-BB4D-4DC1-813D-A4AA3F270893", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*", "matchCriteriaId": "A95D91C4-C539-4458-A6C9-8AE17207AE30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*", "matchCriteriaId": "37F9D218-8198-42C7-88FE-7C5382138324", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*", "matchCriteriaId": "CF8FDD81-95EE-4241-93C8-925085A4CE7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*", "matchCriteriaId": "614D9E35-10E0-4CCB-B817-C7C8C3947BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*", "matchCriteriaId": "F75F987E-F4DB-46FF-B048-21B4A4C07B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*", "matchCriteriaId": "05376F2C-30B6-406D-90F7-6C2E00E85171", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*", "matchCriteriaId": "CCDD3DF6-24BF-4C13-8F07-AF07327E5622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*", "matchCriteriaId": "B1520A64-2157-45D7-A135-F900798C4EB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*", "matchCriteriaId": "05A30F85-5367-4369-B7A5-176D71279FC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*", "matchCriteriaId": "B8803FF9-48D7-4AB0-8A17-4590CABD0BFD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*", "matchCriteriaId": "1DC63B6B-5D6D-477B-9125-007F835981B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*", "matchCriteriaId": "BF385AC9-963E-4670-95A6-BE1EBC3890B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*", "matchCriteriaId": "943FA088-2902-45A9-A1BA-D612B46A50D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*", "matchCriteriaId": "8C80902D-9A6C-47D4-B56F-35C378FC0E63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*", "matchCriteriaId": "1100B46C-8485-4048-BFF8-2BAB311EC04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*", "matchCriteriaId": "4B9E1646-E154-41BA-B9FA-0839A898023D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*", "matchCriteriaId": "03F4C8E6-0043-41A8-94EA-EEBAA1A081E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*", "matchCriteriaId": "31C10985-CBF7-4717-A7D6-2594887D7CB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*", "matchCriteriaId": "8C49886C-B6A0-4D95-8533-329FE5A66F6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*", "matchCriteriaId": "0788CF23-3FAF-44C9-9AAA-96E4818A1AEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*", "matchCriteriaId": "24AF7001-64D1-4BFB-9280-0BA0FAD97A0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*", "matchCriteriaId": "8C6E420E-16DA-4FB1-9968-C93E229614FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*", "matchCriteriaId": "07469E04-B3D2-41FE-A2E4-E25A977026CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*", "matchCriteriaId": "60FF402E-5E4F-414A-A3AB-149548303616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*", "matchCriteriaId": "79E2B875-A270-45C0-A1B1-041264E5B290", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*", "matchCriteriaId": "8C828C8C-7ECB-4167-87A9-0F522C400C66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*", "matchCriteriaId": "0C2C887F-1EF7-468A-A6AE-440793C78DAC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*", "matchCriteriaId": "6F2F3D7F-D884-4ACD-A103-060F57A9867B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*", "matchCriteriaId": "BD1FCAAD-7072-45EC-9ACB-08556458BAF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*", "matchCriteriaId": "C4446224-40E8-4AD0-8197-921D3473E19B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*", "matchCriteriaId": "4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*", "matchCriteriaId": "B92B68FD-771A-4401-8B1D-B1A252356F62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*", "matchCriteriaId": "1B933941-0BE3-4EEB-8FDD-2DAA63343EE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*", "matchCriteriaId": "8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*", "matchCriteriaId": "36F737C1-6011-42D2-9690-CA81EA0A283C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*", "matchCriteriaId": "19CA7EB6-D1C9-48D9-A69A-2618800A6CE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*", "matchCriteriaId": "0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*", "matchCriteriaId": "ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*", "matchCriteriaId": "56C909B0-8FB2-4220-AF93-EECB8D650CC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*", "matchCriteriaId": "FF36BAD0-A762-4F84-BE0B-060FE666ED67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*", "matchCriteriaId": "007337CD-94FB-4ED9-B4A3-9E0EC52D79B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*", "matchCriteriaId": "BCDFA137-F1FC-46BD-9872-D62671B1434D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*", "matchCriteriaId": "2E6DBCB3-E912-43A1-914B-5C7CCFAADE25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*", "matchCriteriaId": "0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*", "matchCriteriaId": "E2C67312-E128-4833-A91E-D7A9F96A7AD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*", "matchCriteriaId": "3F19F408-FABD-4A68-8CDC-C763F0321FB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*", "matchCriteriaId": "68A06EC2-E491-4CD5-9904-61A88EBB7FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*", "matchCriteriaId": "789A8CAE-8D9E-4244-880D-FBE28EC53AED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*", "matchCriteriaId": "F901EE11-D0C9-46F6-8316-D8F4F1D50260", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*", "matchCriteriaId": "E549F600-B9CE-4843-A772-2DACC528903E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*", "matchCriteriaId": "3F28E733-87ED-4610-A8EE-BD37BED7685B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2832E8BF-7AC7-444C-B297-66F770860571", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "44AA72FB-E78D-419E-AA82-B0538C6504D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "687C3BF3-D71A-49AD-8A05-EAC07CBCD949", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "90AF90D9-16C4-4F8A-9868-3E2823E3445C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "3C063C53-8970-45B1-85F8-FB2080BF4695", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "64596ED7-794A-4D23-987B-D9AD59D48EA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "A561A8E8-79E2-4071-B57D-590C22EF86A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "92E46658-60AB-4758-9236-3AC0E6464383", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "matchCriteriaId": "207B8FBA-E2FF-485A-9AD9-E604AE0FB903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "33F99640-C753-40BE-A0A1-4C2D92E7DB09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F98247B-1839-4676-855B-827A4B6C016B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDBA35BD-1048-4B6E-96B2-1CFF615EB49A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6CEEEE2-D6A2-4342-8A73-934093948824", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "979FEE9F-A957-43B6-BB6D-1A851D6FA11C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AF59D-D05E-47F9-B493-B5CD6781FDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF7EC93-0170-45A9-86C7-5460320B2AE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5F803AC-DCC7-43FC-BEB3-AA7984E0506C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "560993AA-299D-42B7-B77F-1BD0D2114CCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C582B1C-1DAC-48FD-82DD-7334C10A2175", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7862B0C-2C44-4110-A62A-083116129612", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "048C5996-F719-4338-B148-0DD1C13E02FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF7FB-AB5A-4549-8C15-E69458C649E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CEF6608-B650-4C77-9823-0AD57B3484F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BE6A2D7-901C-45F9-B487-D674047D522E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ADCB509-5B0E-4592-8B23-EC25A3F79D41", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB51691F-089F-4016-B25E-238074B06C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA37503-FD3D-4220-933C-234631D6EDEF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "matchCriteriaId": "72992831-2A76-456B-A80C-944BDD8591E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79C2131-5566-4CC2-B6ED-38E3F6964500", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "matchCriteriaId": "60BFDAA6-3DFC-4908-BC33-B05BAB462F94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6266056-770A-4E2D-A4FC-F1475257648E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "929AA8F3-8BDF-4614-9806-6D4231735616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "605D7552-8184-4B11-96FD-FE501A6C97DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3144BBDE-CC96-4408-AA02-ECC3BF902A34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B8BA77A-34E3-4B9E-822A-7B7A90D35790", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7165B43-ED22-4714-8FA4-1E201D1BFA69", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CFB133-FAF0-431A-9765-8A9738D6D87C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "matchCriteriaId": "2975B0F2-DB7C-4257-985A-482ED2725883", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "70221E07-3C2E-4A82-8259-AD583EB5CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "427DFD78-56CD-43C4-948E-F53AF9D669F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AD7649-3FEA-4971-9886-6C9312B937A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4EE972C-6BAE-4342-BA01-1D685487F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDFE3B-C064-49A9-BD43-3F7612257A74", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BD0EEC1-D695-41A5-8CD6-9E987A547CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF25B8-D474-4C6B-8E45-F57DDC7074E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DF18FD1-6670-4C3C-8000-A079C69D575E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "921EB5A5-F911-4FCE-A6F1-C66818B34678", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "023063E1-2DD7-487C-A8A7-939FAEE666A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "77255CE6-D7B7-4B48-993C-7100A1170BC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40AC368-3A14-4EFF-A8D0-7EFB4C83045D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C07E80D5-70A5-49C9-9044-D683C7ECCFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "63668AF4-F29C-4424-8EC5-2F0A5950DD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86616FE-0C3F-4984-A364-8A6A9F01DAD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C1C7CD-538D-4D7A-A81C-10DF5376A479", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5922F749-2B23-44B8-8A46-F31BCAEAD279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D75D0EEB-707C-4C86-A569-E91E9F00BA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FB0E20-0243-40A1-8DEF-37150791222E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "68CFF26D-8AD3-4179-9E4C-F06D7C858C9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7541572C-229F-4963-B7F0-06EB3323E53B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "matchCriteriaId": "85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "479F7C77-D16F-4E40-9026-3EB8422E0401", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DB08C8-0018-4A8E-A206-097BDDF83B08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7193E85-30BE-42D5-A26B-3F88817F3574", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "446E8515-45FC-4B8B-8D12-60643D64C07F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDF6B2-D388-4639-87D8-064AA3F6B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "00AAB8B6-B614-4EAA-BA90-C5326CB5D07A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A371DF9-E224-404F-99C2-C2A4607E62D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F40E356-365D-44B7-8C38-A0C89DDD6D3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3132029-89F8-4359-A0DC-A275785266A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02F5685-0636-48AB-B222-434CA1F3B336", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ED4693C-DECF-4434-90C0-56158F102E7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB408A6B-0842-43DA-9180-B0A299FCBCE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6215EBAC-7C75-4647-9970-482120897F1F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D1FD6E8-80EC-461F-9ED1-CE5912399E80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E96F585E-BDEF-45EE-B0AB-94FE23753AC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3279C067-3058-4D46-A739-05404FD0E9B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "matchCriteriaId": "DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C0855225-F501-486A-BD03-2A86FD252B5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "matchCriteriaId": "214C7B0C-C438-4000-9F9B-6D83294243AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4C91AA2E-4BB2-49C8-9364-4E363DF42CB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DA26781F-5A1C-4DA5-835E-D984D697F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA4222-F25D-4457-80AA-6D05CA918D68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "matchCriteriaId": "9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "6777AC35-9D1F-4153-94AC-B25627D730E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "matchCriteriaId": "A5F063F4-8994-4E46-BA7B-A12A112009BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "matchCriteriaId": "4D6F2DE5-AF11-439A-8D37-30CB882ECD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E213DD86-5419-42C8-BF38-7795DDB3C582", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A972291E-5231-439D-873B-2F87BCAF800A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C089CC54-3229-43D7-AA15-73CFA1A43EE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "matchCriteriaId": "EF268D83-C15D-4559-A46F-844E1D9264F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CFE97C0D-3EA1-4314-A74A-7845C7778FB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "matchCriteriaId": "34293F29-F327-4ADD-BF62-78F63F79BB96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "matchCriteriaId": "528C0A46-1CC4-4882-985A-0BB41525BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "matchCriteriaId": "643F3522-A452-4927-944D-532574EC4243", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "matchCriteriaId": "58F40B78-4DBA-44EE-8420-086789EFF53D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "matchCriteriaId": "423BFD8F-4B50-43DA-9979-75FD18FBC953", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8BAD4A68-0481-476F-BBBD-3D515331368C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "matchCriteriaId": "838CEB7C-7C4C-416C-86CE-6E8DD47EF25B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "matchCriteriaId": "CC7D021F-3C97-45B3-B1F7-0AC26959F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4A31AEF3-448D-417B-9589-4BA0A06F2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F7A1D96F-7FFD-413F-ABCE-4530C3D63040", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "matchCriteriaId": "4B8343FE-1320-40AE-A37F-70EF1A4AC4B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD42BA5A-7DA0-409D-8685-E43CF9B61D9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A5FF80E9-CF28-4EF6-9CFE-4B500A434674", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "matchCriteriaId": "647B77A4-2F49-4989-AF43-961D69037370", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "matchCriteriaId": "805B1E33-F279-4303-9DF3-C81039A40C1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "matchCriteriaId": "B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7E0AAE-6539-4024-9055-BE0BAD702143", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7F1A8828-0765-4799-AD6C-143F45FAAD23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "matchCriteriaId": "12D34618-1CCA-405B-A49C-EB384A09C2C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "575D6061-66BC-4862-BC84-ECD82D436E2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "matchCriteriaId": "56B6EE64-1AD4-46B2-BA65-BB6282E56EB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "matchCriteriaId": "11650B45-0BDA-42BF-AEF3-83B48DD6A71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "matchCriteriaId": "BD3C92BA-827B-48AF-BBB3-FB60A9053C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "matchCriteriaId": "AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5EB44CA7-DFE6-4B1A-9A63-97AE30017E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4B305EFA-6226-412C-90EE-F0691F2DDDE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "matchCriteriaId": "7F3874FA-63CB-4B5D-8B64-CE920320A4E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "matchCriteriaId": "0800ED17-50E4-43F3-B46C-591DFA818BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "matchCriteriaId": "A46B0405-F301-4209-8766-6E12EAFAD157", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F99F9F1F-A967-4884-96CF-4488102DC0A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "matchCriteriaId": "DA9B37AD-4599-425B-B39F-E571F4975266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C5A5F1CF-A1E6-45F1-8B09-36566778DB57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "matchCriteriaId": "698C8A49-888B-4675-B3B0-25EDE2FD515E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "matchCriteriaId": "70D98F97-8EF4-48B5-84BE-C3CC27031FDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "matchCriteriaId": "B473D1FA-909B-492E-9C5B-94B0E20E1C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "matchCriteriaId": "BFD5EA7E-322E-4CE6-89D4-7DB1055C9034", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "matchCriteriaId": "67836379-4E1A-45CD-9506-7D3F612E47C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "matchCriteriaId": "5B1BBC61-8664-4452-93A7-DDB4D2E4C802", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "044F0375-DF2F-4D9B-AD7E-473D34165E8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "matchCriteriaId": "2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4A0655CA-A88C-4632-9A18-560E3F63B2F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "matchCriteriaId": "8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C6965851-3B29-4C21-9556-97FD731EAA85", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "matchCriteriaId": "52984FD2-44E0-4E91-B290-0376737EEF6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DF933366-7503-4F8D-B7AA-F6A16210EC37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4E2DAF5D-5BB7-49C6-8426-8B547505B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3EABB21D-D021-434B-B147-CAF687097A5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "matchCriteriaId": "7609424D-95F1-4493-A20C-B1BA4EC6439D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "matchCriteriaId": "966DC636-C802-4D9F-8162-652AFB931203", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A75794EB-A5AF-43F0-985F-D9E36F04C6D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "matchCriteriaId": "31C2CFF0-98FD-4A0D-8949-D554B2FE53D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "matchCriteriaId": "05F9217F-5028-4659-AA8E-F60548DE4D52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4AC769DC-CF2E-4A3C-A610-264F024E6279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "matchCriteriaId": "9B2B1CBF-D155-49BC-81A4-4172F177A5C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "370B2B32-519E-4373-8A04-5C5025D688BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "83D9B562-C279-4A55-A347-F28FC4F9CD12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "2A8C2BA0-48A8-4107-8681-A7C34C553D8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "B1B009DE-A82F-4569-9B42-EC1EC4DA8A40", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "683B6E83-37FF-4F9B-915F-059EBB29DB53", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E218718F-4BE6-48B0-A204-9DD4A932A654", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FB0AB327-B60A-473C-9D36-97766EE62D7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA249EE-4786-4E27-8787-5E8B88C2AEB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBD0529-1CF3-44E5-85B3-19A3323C9493", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D664EE97-07EC-410F-94C3-AEAB2C6A627D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "D31DB981-03B1-4A84-8D87-CD407C3C149F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CBD155D-89D9-4677-A621-4D7613BE65C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02BD0D4-FFFD-4355-97D8-170362F10B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6635781A-2651-4EF2-A5AC-AEEEE63FDE6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DCE6930-760A-48C0-B964-1E3ED6A8517C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E52DE90-DF96-4CE7-B8D1-226BA50E4D09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8EB40E7-9B91-4106-B303-2B70AF395BFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB0D5CD-8AF3-409D-96A7-718641D4B90D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E420B0B-0CD5-41C7-B25A-3DB856055F9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B0C295B-0D63-4BE7-830D-D927E00C301C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "matchCriteriaId": "605C340D-2220-4669-B827-9009CB099E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8791879D-2908-4F57-8DB3-6D24100A9108", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E823DC5B-98BE-4656-BFBF-3A7018F8F213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E8D558-ADE0-4358-9C76-7BD77BF23AA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7973B3D0-F244-4E26-88F5-A2D9BF2E4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "matchCriteriaId": "68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5CB567-4F86-4466-BE4D-BFF557ACAE0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A52611B-6583-4660-90D7-C9472728072B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E80C6E89-B57C-47BB-8B95-50C03DFB3B96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9AB685B-FEE1-41EF-A046-1B34619E12A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB9F6724-967A-4AF0-9896-12BF6164B2CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC1116BF-12D7-47CC-98DB-18B200CF9C16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FBB28DE-726B-4AF0-88A5-35987E1E648B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1880E2B8-5E0E-4603-8D17-3ABA43D28179", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FAFBB92-1917-4238-832B-195FBE418271", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "91DFDF3F-9A3F-42B8-99A1-A3F76B198358", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "matchCriteriaId": "8778F972-BF34-482F-9FA7-71A77F6138E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F288BB0-FE7A-4900-B227-BE80E4F4AADF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E16338-A094-4CA9-B77F-6FE42D3B422C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E07AB33-5351-487D-9602-495489C7C0B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "matchCriteriaId": "22115ED6-1707-4840-B0D1-AD36BC0C75A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C633BC-831F-4CB7-9D62-16693444B216", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD501E1-E78F-44C6-8A13-C29337B07EBE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "matchCriteriaId": "9085BA0B-B7E2-4908-90C0-B4183891C718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "matchCriteriaId": "81971C2F-137A-4F11-8C93-3B99D4CD1B58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E0BDAC-398E-406B-B2DB-AE049D6E98B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFDE6C-DE58-4C4D-882E-474EF6C3D934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "matchCriteriaId": "950C6BF9-AA47-4287-AC01-D183237490FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2355181D-D8EE-4F80-8280-13D5CBCF4779", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5209343F-66B0-4DC0-9111-E2E64CFF7409", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "720109A6-B79E-48E1-9AE7-7708B154788E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "82FF0DBD-AE13-4232-80F7-F4C2E2CC9721", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E944ED-8C02-46B8-BF95-0CE4C352753B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "matchCriteriaId": "77AEA3D1-4846-46E2-9B80-20B19F00DC11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1576978F-E93D-4A47-90B6-6A4E3A7DE558", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D339FE5-001F-4005-88A5-CFFE37F9B63E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BDABA86-497E-497E-A5BA-46F913A4840A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD886F4C-DB6F-4DDD-9807-8BCBB625C226", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4C454B7-E5F4-4AAE-B577-FD71FA002C8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "38BE2781-3A06-4D62-AC8B-68B721DA526B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DA23772-2EB8-4BEE-8703-26D967EC4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "72DC766A-B1F9-4B83-9F9B-CF603EE476BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA594740-43C5-4F42-BA5B-00CA8AE7BB60", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "572B16E2-8118-43A0-9A80-5D96831D55FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB5C551-BADC-4A3A-93E5-2EBCA0704C51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5383B7A3-1569-4FEB-B299-B87CE8C8A87B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A05BBDE0-6C47-4489-9455-7DA7D230ECA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "matchCriteriaId": "1789AA69-EA31-44D1-82E6-228E48E18586", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A7D5FF-3B1F-4C64-BB81-7A349765520D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F0498B3-393A-4C32-B338-E6014B956755", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C451F752-6869-4AFA-BAE5-5C9A54427BF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "83710FD1-099B-436D-9640-061D515E10BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "517B71CE-6156-40E1-B068-A2B733E205E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "11DEEEE5-5055-4CE1-962C-C5F075F4CC02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "matchCriteriaId": "8718DDAB-3208-48CF-9BCE-54DA1257C16A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1AA901-E822-4240-9D82-C9311E4F87B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1CDE3DF-8E79-4997-94EB-B517FFCAE55C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "12A0DE13-EB0B-493B-BC84-3AEB3D454776", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "matchCriteriaId": "1727697B-1F59-4E29-B036-C32E9076C523", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E69E827C-C0D0-46C7-913A-1C1E02CEAACE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2528F3F9-34DC-41DA-8926-382CB3EF5560", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E452C262-5A8D-4D97-BC7F-A4F5FF53A659", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D57BF69-D750-4278-98AA-976B0D28E347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "76ADAE30-6CAD-4F5B-B6F7-C18953144C63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A25D792-E21D-43EE-8B9D-67DE066DE5DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C669783-C058-4B4F-BB9A-84B2C4682247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "matchCriteriaId": "159B088B-9A85-4CAA-854A-AA080E528F95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBE74A94-FE8F-4749-A35A-AB7D57E24913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "990AC341-0E67-4A81-87E9-EE3EFD9E847E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BC18B0-58F1-4477-9978-CA7383C197FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "matchCriteriaId": "474992FB-842D-4661-A565-44AF2CD78693", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "476E1B79-5342-4895-96D7-E97DFC1F5334", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD318D5-89A6-4E28-939C-C5B61396806B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32C7E89-32ED-4328-9313-FA7D3DDBDC58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2792EED8-2CBD-478E-BC09-05FE830B3147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B1AF2F-6E48-4DBD-A60E-3088CA4C3771", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "matchCriteriaId": "34E1691D-65B3-45E4-A544-8B29E38D569D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "matchCriteriaId": "E42F2703-B8AB-410E-AF7B-CD0BE777F061", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "matchCriteriaId": "31244C94-00A3-499C-A91A-1BEF2FB0E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "matchCriteriaId": "878FF6E8-8A6D-44CE-9DD1-2C912AB8A193", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5078A95B-2BD8-4A37-A356-F53D1A53CB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "matchCriteriaId": "0BFE67CD-DE53-4C4E-8245-35902AEFA6E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "matchCriteriaId": "9F231D31-3AAD-4C5D-A225-D2DF94486718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5998DF5D-E785-45EC-B8D0-1F4EC4F96D50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "EADFD013-0BFB-427C-98E6-F9E4774DCBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "58620B10-FEA6-456D-B6B5-2745F5DBE82D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "matchCriteriaId": "E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4858A1F0-97F2-4258-AB98-027BF1EC5117", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3C961A8B-EAFD-4F66-9432-BCC0D154ECCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "matchCriteriaId": "052DE6CD-A1E7-4E81-B476-66EF451061C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "matchCriteriaId": "3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "matchCriteriaId": "751B3AC8-D45E-46B6-83D5-311B693F3C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "matchCriteriaId": "9588277A-0B97-4408-9CF7-11271CDAADD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "matchCriteriaId": "479FE854-85E5-4ED0-BFAF-2618C9053082", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "matchCriteriaId": "E048B9BF-77C8-49F7-9F2D-9999F79BA264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "matchCriteriaId": "6CD16D4D-E816-486D-96F4-5A2BF75B959F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "matchCriteriaId": "169C558E-1A83-47D5-A66B-035BD1DD56FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "matchCriteriaId": "D683E509-3FB2-4175-BCAB-4EB1B5C04958", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "matchCriteriaId": "6FCFA915-5445-4732-9F8F-D7561BA4177F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "63A9FD98-C22D-48F6-87A1-60791C818A1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "matchCriteriaId": "85F99F24-1783-4E6E-BE61-04C2E80356ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "matchCriteriaId": "74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "matchCriteriaId": "85289E4C-C813-4677-867D-EE8E98F4A1A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "matchCriteriaId": "27C8150F-BEFA-406D-9F0D-E7CB187E26AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "matchCriteriaId": "1E807F90-819F-4103-B1F7-4CE46971BD63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD93203F-71B9-4F87-B5D8-FD273451C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "1E652C74-C48D-4F29-9E85-09325632443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "99158191-3013-4182-8A53-5DFCA1E2C60A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "matchCriteriaId": "F7E39A3E-7EAE-47C9-930B-58A980B73FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "matchCriteriaId": "FFDA54BA-C00D-4890-9B7F-328257607B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "matchCriteriaId": "1F5EFB1E-334C-4B55-8E2E-6AE19B34774D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "B8260DCA-2F0C-45F7-B35F-D489AF5639F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "matchCriteriaId": "7778F81B-6D05-4666-B1D4-53DB0EC16858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "matchCriteriaId": "5DC6706A-61F7-4AA0-B2FF-0FFDF739A644", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7EF1B16B-02F2-4ECA-938E-B5CDCFC67816", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3C5501D8-1B0D-4F5A-AFD7-C63181D3281F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "matchCriteriaId": "1751F0CE-A0D3-40E2-8EEC-D31141FE33A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5FF9AFA7-BBE8-4229-94CB-5A9596728BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "matchCriteriaId": "E23A777F-68A4-4217-A75A-4D8A27E6451A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "matchCriteriaId": "2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "392A4337-11F6-4980-A138-4FDBCAD0EBA4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E2E9BB67-F1FF-4190-889F-78B965CCE934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "matchCriteriaId": "F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "35607317-0928-4297-A33E-D44BEE1BBEC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "matchCriteriaId": "D48323B1-7FEB-451F-A064-23E7CE7F6403", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "matchCriteriaId": "29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F5763189-7980-4A72-92C9-1908FE9E15EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "matchCriteriaId": "C53ACD49-DA21-4DDE-A0AA-FCCD59D29886", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4326D350-EBC2-48E6-A2C6-0499F6826CEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8594E6FE-B6DB-4343-B3DD-AEC19923DAF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5BCADA00-E453-414D-9933-FCB43D21BBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E62212D9-F707-4A8E-AB2A-A3985E7A4049", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "matchCriteriaId": "561755A8-8AAD-4F41-8266-747EFDAF2D55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "matchCriteriaId": "E6F4BB0F-DAF4-479B-B78A-7929C151AA1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "matchCriteriaId": "A207312E-1D35-4464-A111-22C4C793E146", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E9B16E32-07D5-445B-BAA5-4E4A0881BFC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7CF08F6B-2ECB-414C-82D7-C06085BF8B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "matchCriteriaId": "21032BE3-74D8-4C3F-B461-158F475B6853", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*", "matchCriteriaId": "F6E468FE-73BE-4B20-B774-58EC7CD20CDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*", "matchCriteriaId": "0FF6B19B-7D45-44B3-8524-407253B93EEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*", "matchCriteriaId": "2B803FAD-E54D-49FE-A078-029B8FFBBB98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*", "matchCriteriaId": "CC511505-ED67-45B4-B76C-56AB750C4408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*", "matchCriteriaId": "A430C232-79EB-4264-AE24-41D4A2A5D990", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*", "matchCriteriaId": "3A9E3D4B-A3DF-4858-8C64-0316B6E57435", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*", "matchCriteriaId": "19108672-E1AA-41CC-B86C-061D3721C8B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*", "matchCriteriaId": "200D36CF-AEDE-4183-8C54-748E6E5A3218", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*", "matchCriteriaId": "4CF13A44-5163-4282-8EE8-7DC05499B5E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*", "matchCriteriaId": "827C12CE-D87D-489D-ABA7-BE0405EC33D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*", "matchCriteriaId": "16AA78F7-520B-4FFC-838C-DC74FEE8E13F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "matchCriteriaId": "588D4F37-0A56-47A4-B710-4D5F3D214FB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:local_service_management_system:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "668E2252-2290-41B5-95AB-95FB6092FF8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:local_service_management_system:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "DBD9A6A2-3AE0-46A5-A953-1ADC280C16E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:local_service_management_system:13.3:*:*:*:*:*:*:*", "matchCriteriaId": "7511381A-142F-4EC4-9399-86BA8218A6AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "matchCriteriaId": "964B57CD-CB8A-4520-B358-1C93EC5EF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "521AB96C-3C60-44E1-935E-C6037343A3DC", "versionEndExcluding": "1.1.7-6941-1", "versionStartIncluding": "1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C997777-BE79-4F77-90D7-E1A71D474D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:synology:virtual_machine_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F53AB67-1CFA-467B-B2B1-D2447886FECE", "versionEndExcluding": "6.2-23739", "vulnerable": true }, { "criteria": "cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FB76C76-94F1-4109-9BA0-2390112816B3", "versionEndExcluding": "6.2.2-24922", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D0C5120-B961-440F-B454-584BC54B549C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:synology:vs360hd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "66FC24F8-1B82-40EC-856A-2EA1736FFE5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:synology:vs360hd:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8E2100A-F6C2-4B86-A4D0-08D998BEC86B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "matchCriteriaId": "1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp2:*:*:*:*:*:*", "matchCriteriaId": "3C04C1B2-B0C7-402D-B79E-B0157E011B28", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp3:*:*:*:*:*:*", "matchCriteriaId": "E6334AF0-79FD-444D-BD41-DC8BF90A4109", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*", "matchCriteriaId": "41E76620-EC14-4D2B-828F-53F26DEA5DDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*", "matchCriteriaId": "5A7ED7DD-A7D2-4A71-8415-26103530AB2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*", "matchCriteriaId": "CE80FF2C-0075-4F00-938F-C2C267E950D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*", "matchCriteriaId": "CEF98D6C-3C80-4A42-B14B-22D69BC1F4C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "matchCriteriaId": "50E90625-DEB3-49D3-89B6-E9EEFFABD975", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*", "matchCriteriaId": "6E24E90D-6E89-439A-8418-440910C3F07C", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*", "matchCriteriaId": "33AFC27C-16AF-4742-9891-2240A73C6602", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "93C10475-AE35-4134-BB87-45544A62C942", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*", "matchCriteriaId": "044039A3-2AC7-4685-B671-C9B9FFD4ED6E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "477B6938-2314-487E-BB35-354B335AC642", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2F2C6D-3F41-4C42-81E2-01A52AD035B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D44EBD85-6140-41CD-8D26-29554CD2FBA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a8:-:*:*:*:*:*:*:*", "matchCriteriaId": "87BC54A8-6CF9-453F-9008-72CBA8C62BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "17DD7CB1-76E8-41C3-86B8-E43ECBB5E6CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a9:-:*:*:*:*:*:*:*", "matchCriteriaId": "4437E468-F93D-4CE3-A156-06F631030A41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03311F2A-30E6-474E-824A-281ED3DE86AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a12:-:*:*:*:*:*:*:*", "matchCriteriaId": "40B4D5CE-8DC1-4300-BCF0-71CFB4331B71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a15_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23EADA1F-73E8-4E70-AF90-CE8D26552687", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a15:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FDE279-49C3-452A-B9B0-36199C221F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a17_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D591F3BE-13BB-4006-BE46-E975779DE5E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a17:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D90DFDC-0B90-4431-9A23-194A5BC651F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68D895EC-B0A9-4292-AC64-60673F72C765", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*", "matchCriteriaId": "B00CD88D-5649-403F-A55A-BD49427D30FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38768B2B-F1A3-4A76-8716-9520CA075F3D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*", "matchCriteriaId": "16E23102-964E-485D-8EFF-4B1BBFE6EDE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7173A6DC-4D4E-424C-A922-C16D67627834", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B1374D-59E8-4FE5-AC6C-0323AB1DD60D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A891447-2F1D-48B4-AA47-3CB7EA4FDC7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C1DF922-1F46-41A6-A367-E56DD8C4163D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08CC4E5E-2794-4893-9B45-E14A3F4CF159", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E4FCA77-71D3-495E-BA2A-2953369E5DCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pepperl-fuchs:visunet_rm_shell:-:*:*:*:*:*:*:*", "matchCriteriaId": "F926EFFA-6C44-4D99-B1EB-C9EAB63B6768", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:pepperl-fuchs:btc12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1F44360-2B5D-4154-9D58-8ACEEF99DF15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:pepperl-fuchs:btc12:-:*:*:*:*:*:*:*", "matchCriteriaId": "1574ACD1-F5EC-47C9-97C5-A456E2C1D7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:pepperl-fuchs:btc14_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DD89499-E4BE-4ACD-878C-06EB2BD59FC5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:pepperl-fuchs:btc14:-:*:*:*:*:*:*:*", "matchCriteriaId": "9111BA3B-6A12-4974-9B94-548F6968BB8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A6E548F-62E9-40CB-85DA-FDAA0F0096C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAAE5EC4-9BB6-42EB-9B20-9CC3FADB1C8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D74B2ACC-6043-40F3-AAEC-BAEC804C7C65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc12_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE50478-AEA1-4DE3-9032-289DC6955634", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc12_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EDAE7D8-7902-46C6-AE2B-8AA76E84417F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc15_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5D8E919-CFBD-466A-A519-9B509A4E3663", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc15_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCA09162-3331-49F6-A183-DDBE51C7F0FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc17_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB43A6C2-20DD-437D-AE6C-00A20C760CFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc17_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F230367-F012-459C-AA19-38B2856C12A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8C44C9C-BA5D-42DD-968C-7D75795A1ABC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F51A0C40-1A6E-4955-A498-F94EBDCCE0A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_2001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91424832-CC0F-454D-A77B-3D438D17CAB2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_2001:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9544FE3-45A5-4803-A682-305C7BE488E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2498F2D-5A4B-4893-84E3-1144C6A16F01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE01550-016B-4BBA-9E56-FC18F0D52C82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_3001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B39DD6E-EB5B-46AE-9F7E-C3AB8744DC33", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_3001:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DA86326-3959-40AE-8984-F01B6C49C846", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc15_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34215265-15D4-4662-9D8A-20E8F48560BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc15_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE66F952-2BDD-4700-AA3B-6CEF7EFBA4F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc17_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6EF7D36-9416-4634-AC9F-4115560E450F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc17_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A4D7BA0-3715-4E91-A63F-AEA251BA35F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F9519E-5640-45EF-8D4D-65E81797B967", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E5A7C1F-3F46-4374-9F62-DC7B28020D86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "236A1006-7E56-4D2A-A9AF-C11E98EFBA56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED51E38-43DC-4214-8011-A223D6C03486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9901BBE2-F9C3-4F5E-82FF-9C84691BF148", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E67487D-73DA-4105-B4F8-41A1D54640DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc15_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "772FFDA5-B054-4F97-A399-9A8E4B4830FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc15_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF2DB741-F0D0-4607-A40B-4A9BB97231BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc17_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B647A88-B245-4796-BE42-EEE78D06F500", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc17_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "3622D879-BA40-48B1-89D5-608AA99333A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_rackmount_2u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "624F92AA-903D-4ADC-83BE-35B4EAE7F740", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_rackmount_2u:-:*:*:*:*:*:*:*", "matchCriteriaId": "783D5428-AC98-4C58-AD6F-0D518B695529", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_rackmount_4u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69097B1F-C3EC-42FA-8C69-32D9DC430611", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_rackmount_4u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3F1000E-ECF5-4952-BE18-53DEB7BA8135", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_bpc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12165D80-E3BA-4254-A3C0-F9785ECEE6A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_bpc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8631B12E-CE9A-41D2-BE3E-1C2FAF513468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_ppc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2378F6D3-FF9D-45AD-932C-9ED4B3FE8CFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_ppc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF9E21E1-C9C6-4790-9C8F-153A0AA2120C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_bpc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F999652C-BCCA-4EFC-B859-4D6D995267D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_bpc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA4BAB42-0A0A-480D-9DF2-7E99E45A12E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_ppc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "86F3E671-D5BC-4FDC-9878-A6FB248E2D1D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_ppc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E838BFB-784F-4E36-990E-F50F554FCD15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_bpc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E9E5307-7E77-4002-95EF-7FE4AB32EBCE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_bpc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "A537819A-95AD-406A-960B-A56DF4199B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_ppc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E3CCD-39B6-43DB-A922-CBFE1CA5431D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_ppc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F097E450-3E21-429E-8EDE-A20A32E205E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:dl_ppc15_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60030678-EC0C-4B4C-97DF-8B8EBE1DED97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:dl_ppc15_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A2FE4D0-D0BB-407E-9270-88269BE962C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:dl_ppc15m_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "012D6DF0-E257-48B0-AF01-3226E6065590", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:dl_ppc15m_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5EFEB19-FCBB-4B6B-BAD2-786608E95E07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:dl_ppc18.5m_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21FDD77C-F607-48A0-9D03-29CC232213D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:dl_ppc18.5m_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "A21D272B-5DA1-48C4-9C29-60FD1DA3B560", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:dl_ppc21.5m_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADFF99F0-4651-4CC4-8CD5-01DF8929B10E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:dl_ppc21.5m_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "13C2D96C-0AC1-476A-9674-957745E134C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:el_ppc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D06CE4B7-C9DE-4EAF-8F94-2381AC559959", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:el_ppc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5EF7960-4750-4ADA-B0A6-5B454A6A77E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:el_ppc_1000\\/wt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EC378F8-533D-4F7C-99A3-0C2394C99172", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:el_ppc_1000\\/wt:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A942215-96BB-4E0C-AFBE-3FF70719B15F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:el_ppc_1000\\/m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8559D73D-1275-4275-93FD-77E252C5E4C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:el_ppc_1000\\/m:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F8F8B95-79EB-437E-A9CB-B5C0A9E395F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:valueline_ipc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "525798C3-7035-43D1-99FE-653797DECA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:valueline_ipc:-:*:*:*:*:*:*:*", "matchCriteriaId": "9797EACE-8534-486F-A48B-7509F7906CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_bpc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "658A8B84-8735-4CB8-9E9F-702786DD630B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_bpc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC14F03D-4C8C-4EB5-A4B9-D1D7364796D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_bpc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B25B0B2-FFA4-43E4-B61B-EC322E39B084", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_bpc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "92563152-F7DF-456A-828A-F225271F4B43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_ppc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAC1465C-D4E4-40A8-BC36-FC5FD3F84EB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_ppc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "717629B0-0981-4233-89AB-AF234847B639", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_bpc_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3684354-FC1C-47A7-9AD7-00AF992B7605", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_bpc_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B804BA1-9CD7-45AE-B28D-01337A800213", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_ppc_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "054E26F9-188E-4F15-BB1A-8056639C69FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_ppc_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C7A6530-9CBF-432D-BA7B-45772C325A02", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_ipc_p7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EE73860-B3B8-4A96-8129-9AF45686F966", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_ipc_p7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D68B1755-4154-4648-980E-3B998B9621C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_bpc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA0714-60D4-4D6E-95A6-3195F84F3F2E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_bpc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "18B811D9-EC0D-4623-AD5C-2757AD27604F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6C25A38-9F53-4AB9-A11F-9DF08D7CC9E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF2F5EFC-6FB1-44CC-A9FD-BAD6D6A29CD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_bpc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C712CB21-C5C6-47E3-9C6A-E5E280E87062", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_bpc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D201C6-1DFD-4A0A-BCD7-024E5ADAFA0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B8CC783-4144-422D-A154-72CC83D83E14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FCEF736-BE5C-4BA9-80E0-304D55073F36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_bpc_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "592BE162-B9B4-4CCD-A5CB-4C316B14BFB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_bpc_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "4548FEDD-22AF-4753-A805-0FAA8BA22410", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DD2E38F-01EA-4396-AE9E-B723FFA0E8D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DEB26DA-6CA5-4694-AB96-4E376C0D4018", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_bpc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2EE280-6E1D-49C5-90B8-FA1940CC6E77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_bpc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0ED092A-9CCC-4794-B8CC-531572B32F0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2596D20-A6F7-4FE7-9E94-11965188DB68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF7632B9-340A-4249-91B3-0C93232B3108", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_bpc_9000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BD42607-7668-4ACC-94F3-E4C1F510EE38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_bpc_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC743E65-BFC2-4149-AB51-F529AB934296", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc_9000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0A1D10-B700-40A2-9A89-DDBD809294DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBED3056-BE7E-47DA-9818-4D57E29E7586", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc7_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67B75497-625B-44D2-8552-F8AA597EA6D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc7_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA9B7B72-413E-4B2E-A68C-D5A748CA4CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc9_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "766B3429-8B60-4774-BFCA-349F59846D6D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc9_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EC738BF-9BDB-4969-B00E-253D47C583D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc12_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3452BB23-7A21-48F5-971F-9D8C92697B36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc12_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "45335605-EBA7-4C20-A334-A427656FD261", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "766841A0-9E9F-48A6-B815-467734AD7D68", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1500:v3:*:*:*:*:*:*:*", "matchCriteriaId": "CD355D0B-151A-457B-B0C9-7A6314315364", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1511A71-8E8B-4985-8A39-69C801D48BFC", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1500_pro:v3:*:*:*:*:*:*:*", "matchCriteriaId": "F8D4A368-64AF-412B-B5BB-AD6BC84F95C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13EA8C25-9918-456E-B0F5-206081207E98", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1900:v3:*:*:*:*:*:*:*", "matchCriteriaId": "070D8D5D-0703-41BC-8D44-8379409D7CFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D54BE23-10D8-4FD2-9C0F-49785E55E28D", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1900_pro:v3:*:*:*:*:*:*:*", "matchCriteriaId": "1402705D-BB4B-4639-92A8-B939B6AB3173", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "482C1848-4840-4CE4-B8C1-E387CA672AB3", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc2200:v3:*:*:*:*:*:*:*", "matchCriteriaId": "41507D57-119A-4EE6-8F3C-7DB635298F1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDA0CBED-0140-4319-817C-CAE812EA5815", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc2200_pro:v3:*:*:*:*:*:*:*", "matchCriteriaId": "74DC92AC-246D-4DA2-85B3-B33EA5839310", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9C4333E-242B-472B-88A6-41669FCE48E4", "versionEndExcluding": "2010", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:-:*:*:*:*:*:*", "matchCriteriaId": "E84371B8-69B9-4C60-B1AE-9EA89E25961B", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp1:*:*:*:*:*:*", "matchCriteriaId": "4CBC4304-6AD9-4C12-B814-76CCCF9EBF0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "222D35AE-B32B-4167-9A6D-E88CCF3C823C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6034789-ABD1-4035-8378-F0BA7157B087", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "20740117-8BC1-47B8-AA10-8ADF91F1CA86", "versionEndExcluding": "8.5.9", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "133DFB76-70D7-4480-B409-2A657DF3B6AD", "versionEndExcluding": "12.5.8", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:-:*:*:*:*:*:*", "matchCriteriaId": "B66C5256-6863-4B81-BC82-B76320467449", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312101:*:*:*:*:*:*", "matchCriteriaId": "5D98B374-B2FC-47C3-8376-B9F45664C436", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312102:*:*:*:*:*:*", "matchCriteriaId": "B75207AF-2BB8-4D6B-AF4C-BEB25895BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312401:*:*:*:*:*:*", "matchCriteriaId": "4091C844-6778-46D2-B135-CD4E3FAA0714", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312402:*:*:*:*:*:*", "matchCriteriaId": "7A3308A7-AF6A-4519-92E2-EF5FE6F9C78B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403101:*:*:*:*:*:*", "matchCriteriaId": "BB2F377F-7260-47FE-9F50-40374EA1ED9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403102:*:*:*:*:*:*", "matchCriteriaId": "B73A27AE-5483-4F59-9D03-1E65CEFB5EBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403201:*:*:*:*:*:*", "matchCriteriaId": "67E6B861-B758-48C6-9B4E-CA348D4A8D11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403202:*:*:*:*:*:*", "matchCriteriaId": "25D9AB99-4AD7-4765-9832-44180E038BB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403203:*:*:*:*:*:*", "matchCriteriaId": "0AB2650C-DF46-498E-AD6E-549649A20849", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403204:*:*:*:*:*:*", "matchCriteriaId": "CE7D5CA7-2D77-4B44-AE53-DF07A9D3E43F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403205:*:*:*:*:*:*", "matchCriteriaId": "7E9270E3-F4FC-43ED-BA80-67F321BF33C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403206:*:*:*:*:*:*", "matchCriteriaId": "B687FC8F-DE82-446B-8EB1-3F3193735D26", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403207:*:*:*:*:*:*", "matchCriteriaId": "1B710A10-5076-4473-88AE-CA4A9935DF77", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403208:*:*:*:*:*:*", "matchCriteriaId": "432C66F0-03FA-4E0A-805F-7505B92C348B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403209:*:*:*:*:*:*", "matchCriteriaId": "4B0B6D86-60E9-4193-8E8B-F07DF7410746", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403210:*:*:*:*:*:*", "matchCriteriaId": "D17F3263-3107-4785-BF6B-8A62A13FC720", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403211:*:*:*:*:*:*", "matchCriteriaId": "5A86BD5F-3858-4E50-995A-CEBE0C0FC19C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404401:*:*:*:*:*:*", "matchCriteriaId": "0FB7F12A-3C70-41DC-B64F-990316118A07", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404402:*:*:*:*:*:*", "matchCriteriaId": "A1CF97B6-E3AE-47A6-A49F-3BFE66CB87F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404403:*:*:*:*:*:*", "matchCriteriaId": "A644757F-6A6F-49F5-9B81-06F10C5E34EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404420:*:*:*:*:*:*", "matchCriteriaId": "D84D5E4F-DDBA-42B7-974B-02DCB780E8CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201406401:*:*:*:*:*:*", "matchCriteriaId": "979169D0-0C6E-4B4A-8FEA-FEBE33B09D0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407101:*:*:*:*:*:*", "matchCriteriaId": "20EB85A2-0051-430F-85B8-C2DA446E0AC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407102:*:*:*:*:*:*", "matchCriteriaId": "12156ABC-3724-4F3E-9E38-7C2C896C48EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407401:*:*:*:*:*:*", "matchCriteriaId": "BC573DAD-46D1-473A-B530-862DD301F287", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407402:*:*:*:*:*:*", "matchCriteriaId": "08A9F95B-6B7A-4CDE-94AC-3235ED59B1E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407403:*:*:*:*:*:*", "matchCriteriaId": "05F30A0A-DC59-4BDE-9060-BE25E35A21BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407404:*:*:*:*:*:*", "matchCriteriaId": "A6B31963-6FA3-4EC8-9F95-A999EB95B3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407405:*:*:*:*:*:*", "matchCriteriaId": "B7DE1928-2F1F-442C-9E10-080AD9BD8D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409101:*:*:*:*:*:*", "matchCriteriaId": "D52E2286-239F-4486-9FB1-40ABF2C3A4D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409201:*:*:*:*:*:*", "matchCriteriaId": "7D8617AE-22D6-4A9A-864B-6B104AE19826", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409202:*:*:*:*:*:*", "matchCriteriaId": "9AE60429-3163-4621-9973-9569C489D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409203:*:*:*:*:*:*", "matchCriteriaId": "946564F5-90DF-47FB-B704-434222171F72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409204:*:*:*:*:*:*", "matchCriteriaId": "7B371375-2F70-4A5C-81A1-3D24236EE06C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409205:*:*:*:*:*:*", "matchCriteriaId": "2D89D1FB-354B-4F47-9B68-BC88266C603D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409206:*:*:*:*:*:*", "matchCriteriaId": "990EA9A7-AA65-41D9-BFC3-987DEB875AF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409207:*:*:*:*:*:*", "matchCriteriaId": "45930839-7669-46B1-88A8-EC7448CFAA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410101:*:*:*:*:*:*", "matchCriteriaId": "116EC72C-1639-4E89-8DA5-14F326D8E91D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410401:*:*:*:*:*:*", "matchCriteriaId": "56ED6A51-50F6-4181-9FFB-411854102B44", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410402:*:*:*:*:*:*", "matchCriteriaId": "013566F1-27AD-408A-9ADE-3D88865FC560", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410403:*:*:*:*:*:*", "matchCriteriaId": "B924FE54-CA68-4C95-A9DA-DD37F2B8D851", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410404:*:*:*:*:*:*", "matchCriteriaId": "953DC00C-C694-4AFF-AC8D-3EF8F7B2EA9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410405:*:*:*:*:*:*", "matchCriteriaId": "71726A09-D9DE-4063-8B83-35F5E1C15C4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410406:*:*:*:*:*:*", "matchCriteriaId": "466ADBAF-9B8A-4F46-A061-3892CDFE0BE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501101:*:*:*:*:*:*", "matchCriteriaId": "A5E9B1C7-54CF-4761-ACC4-85D706ECE6FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501401:*:*:*:*:*:*", "matchCriteriaId": "7870F2CD-247B-4F1F-BE7E-B0A73210CB7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501402:*:*:*:*:*:*", "matchCriteriaId": "21D439E5-9283-41F2-A68E-48C27648A4F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501403:*:*:*:*:*:*", "matchCriteriaId": "FE762CF7-9B71-4E79-AF1F-077FF2584F3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501404:*:*:*:*:*:*", "matchCriteriaId": "A86BD94F-D60A-4E5C-808D-F129B2C221F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501405:*:*:*:*:*:*", "matchCriteriaId": "91CA06BB-2978-48E7-974C-AE588D0B773B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201502401:*:*:*:*:*:*", "matchCriteriaId": "AEC96D0F-56B5-4582-8519-5CFD59276221", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201504201:*:*:*:*:*:*", "matchCriteriaId": "D8285D4D-9962-42CC-95C6-F5452EA62B11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505101:*:*:*:*:*:*", "matchCriteriaId": "C715C51F-F1FC-4B92-BF77-EC75882CFE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505401:*:*:*:*:*:*", "matchCriteriaId": "F1BA0B41-E7B7-469F-BEB1-73A6A3315BA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505402:*:*:*:*:*:*", "matchCriteriaId": "26E44694-3121-4F50-9052-BAB42D6B45C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505403:*:*:*:*:*:*", "matchCriteriaId": "CF156298-D57B-4F30-8895-C3DCE5D8FA7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505404:*:*:*:*:*:*", "matchCriteriaId": "2485CC85-A58A-41A3-A0C3-F52C82D772A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509101:*:*:*:*:*:*", "matchCriteriaId": "3CB9206E-98ED-472F-8272-3DA2FEA82696", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509102:*:*:*:*:*:*", "matchCriteriaId": "83FEB3AF-DB9D-4958-AC26-04C694F0416A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509201:*:*:*:*:*:*", "matchCriteriaId": "62A760D9-FEA2-49AD-8250-3A830398ECD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509202:*:*:*:*:*:*", "matchCriteriaId": "43E6E75D-D814-4DAA-9759-6948955501DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509203:*:*:*:*:*:*", "matchCriteriaId": "BEFD9527-F0CA-493B-A894-4BB26AB65F54", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509204:*:*:*:*:*:*", "matchCriteriaId": "9DC241D3-4352-4339-8C81-BA7878FD5062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509205:*:*:*:*:*:*", "matchCriteriaId": "D2E50F31-00DB-4724-982E-E39E55E75FBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509206:*:*:*:*:*:*", "matchCriteriaId": "1099C9B4-11A1-4545-8054-5CC247286617", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509207:*:*:*:*:*:*", "matchCriteriaId": "8F018232-8B68-4496-A38B-6E1B84F1AA28", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509208:*:*:*:*:*:*", "matchCriteriaId": "D0F66CE5-E0BD-41B4-9D36-1C626FFF2141", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509209:*:*:*:*:*:*", "matchCriteriaId": "08CB5270-1BD3-48D0-AB8C-B3CF0C52499F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509210:*:*:*:*:*:*", "matchCriteriaId": "EC263338-15D1-4F8C-8BE7-494971F31682", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509211:*:*:*:*:*:*", "matchCriteriaId": "061C95B9-845F-4235-9ABE-7BD5F555209C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509212:*:*:*:*:*:*", "matchCriteriaId": "75EB3FC3-C4C1-4841-88E6-922CADC9B402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509213:*:*:*:*:*:*", "matchCriteriaId": "FE0F78D7-2139-46AD-9C69-229BA94896D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201510401:*:*:*:*:*:*", "matchCriteriaId": "A630790E-2F77-4C05-91BD-06AB8894A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512101:*:*:*:*:*:*", "matchCriteriaId": "6A96EA60-16A8-4129-8E2E-B8B5C4F83D39", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512102:*:*:*:*:*:*", "matchCriteriaId": "A30EE76C-594A-4DD2-95D5-8E8D8B6D3185", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512401:*:*:*:*:*:*", "matchCriteriaId": "D9A31A47-DE48-42AA-B7CD-4661624A50A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512402:*:*:*:*:*:*", "matchCriteriaId": "B0CC39CC-45DF-4461-9219-808CBE68592A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512403:*:*:*:*:*:*", "matchCriteriaId": "4FAC6817-6316-4592-8510-02772D3EFF3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512404:*:*:*:*:*:*", "matchCriteriaId": "711F5017-AEC2-4649-AA8A-6A596591F11C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201601401:*:*:*:*:*:*", "matchCriteriaId": "A12209C7-0027-46B1-A8D8-535A631A4FA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201602401:*:*:*:*:*:*", "matchCriteriaId": "8D09CF29-38FD-487F-8597-518F206531BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608101:*:*:*:*:*:*", "matchCriteriaId": "D35EAA15-0DEA-42D8-AEFE-F4CB6BC6CFEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608102:*:*:*:*:*:*", "matchCriteriaId": "BEC12F16-071D-4648-A044-1274CBACE988", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608401:*:*:*:*:*:*", "matchCriteriaId": "0763BDFC-0D5D-43E0-BD3C-F6A7D41F53C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608402:*:*:*:*:*:*", "matchCriteriaId": "57160A54-9049-4F31-AF1A-28A18F0EFF95", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608403:*:*:*:*:*:*", "matchCriteriaId": "54AD4072-BFAE-4941-8CC3-6DE5E3222DAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608404:*:*:*:*:*:*", "matchCriteriaId": "9109EB3E-C635-4B99-9BE5-B9FD9C4B5D6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608405:*:*:*:*:*:*", "matchCriteriaId": "2E01FEF6-8D64-428E-AFB0-FFEB21CCDC39", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609101:*:*:*:*:*:*", "matchCriteriaId": "910B3A6A-F418-4A0E-B612-DECD4900BB14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609102:*:*:*:*:*:*", "matchCriteriaId": "A6B5E386-0BFC-4F1B-9D1A-E2F31C8A05BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609401:*:*:*:*:*:*", "matchCriteriaId": "29175BA1-3A31-4E9E-8B52-B078CC33F51C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609402:*:*:*:*:*:*", "matchCriteriaId": "573A99EF-0B6B-41D6-B71F-1C21B1565A3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609403:*:*:*:*:*:*", "matchCriteriaId": "209AD390-0ABA-4225-9168-A769ED7808DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612101:*:*:*:*:*:*", "matchCriteriaId": "C4553BE6-DEDE-4E16-A335-1F8DE5F7B9E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612102:*:*:*:*:*:*", "matchCriteriaId": "5909ED7E-B49C-42D5-A634-788733D49FE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612401:*:*:*:*:*:*", "matchCriteriaId": "21B55E0E-8923-4779-970F-A335C708CD3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612402:*:*:*:*:*:*", "matchCriteriaId": "D0B9CB8C-8072-46E3-8A6F-41FDB2365436", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201703401:*:*:*:*:*:*", "matchCriteriaId": "6C2C8471-D52C-41DF-A96B-E6D0A1E7A070", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709101:*:*:*:*:*:*", "matchCriteriaId": "E2A9B43C-51F7-42C6-84CD-B882055915B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709102:*:*:*:*:*:*", "matchCriteriaId": "9F239FF7-CA1E-4711-A8A8-C1F945366E19", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709103:*:*:*:*:*:*", "matchCriteriaId": "7E696E99-6F94-4C74-911A-01162CA34B15", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709401:*:*:*:*:*:*", "matchCriteriaId": "0B18A0A1-F28F-4282-B871-06344A674EDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709402:*:*:*:*:*:*", "matchCriteriaId": "FE2DA304-2C7F-4F5A-A3D0-0DF15E442B1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709403:*:*:*:*:*:*", "matchCriteriaId": "EEF8BCE8-567E-4392-AD10-4DC4EF93E5CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "matchCriteriaId": "8BF80536-348A-468E-AC1C-DA53632FCC83", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "matchCriteriaId": "CFABF302-AC32-4507-BDD9-314854DE55BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "matchCriteriaId": "9EDE020F-4FB1-4F1D-B434-6745045702D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "matchCriteriaId": "AA1538B9-E860-46CE-A4CA-1393ECA20D30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*", "matchCriteriaId": "386A6805-6167-47BA-A02F-073DC7E0FE36", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*", "matchCriteriaId": "03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*", "matchCriteriaId": "1CFCFE7B-37E5-4C64-9B43-4F693F227231", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*", "matchCriteriaId": "02CFAE22-37DB-4787-96FB-9E0F8EF671E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "155A0C39-4D0A-4264-B392-46002908939C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*", "matchCriteriaId": "514DE9F5-D826-42AA-B4CF-3EB09F4D3D5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "96AB8C81-F441-4563-B5E0-B738DF4D1C50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDA3C472-D1E9-47B3-AFD0-BD274E3291F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E30BECA7-C45A-423D-9200-98D51BE9C84C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E376B2A-430D-4D1D-BC28-92CD7E1E8564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4164A584-6F0D-4154-8FED-DC044CDE1FE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*", "matchCriteriaId": "74C9E6FC-9C40-4105-9FB0-17013E1ABBB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B37176F-0AF4-4410-9C1F-4C5ED0051681", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2F2936E-A611-472E-8EF0-F336A19DF578", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D200C1F-1909-4952-824F-A2D279B9B37E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FC9F68C-7D65-4D29-AAA1-BA43228C6208", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." }, { "lang": "es", "value": "Los sistemas con microprocesadores con ejecuci\u00f3n especulativa y predicci\u00f3n de ramas podr\u00edan permitir la revelaci\u00f3n no autorizada de informaci\u00f3n al atacante con acceso de usuario local mediante un an\u00e1lisis de un canal lateral." } ], "id": "CVE-2017-5753", "lastModified": "2025-01-14T19:29:55.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "[email protected]", "type": "Primary" } ] }, "published": "2018-01-04T13:29:00.257", "references": [ { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "source": "[email protected]", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102371" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040071" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "source": "[email protected]", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "source": "[email protected]", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "source": "[email protected]", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://spectreattack.com/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX231399" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "source": "[email protected]", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://spectreattack.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX231399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "matchCriteriaId": "CD028C10-FD07-4206-A732-CCAC1B6D043D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "matchCriteriaId": "704FAA50-1B7D-4917-AC4A-4C58785340F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "matchCriteriaId": "5C6B95D3-75BD-4826-BFBE-9701CC0FF052", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "matchCriteriaId": "F66E31A6-EA01-40C8-8718-CE2C1F45EEB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "matchCriteriaId": "DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "matchCriteriaId": "022F2CBE-EFB1-4962-AC91-D25AAB057DAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "matchCriteriaId": "69C05CD9-551B-46EE-85F8-D18FF878FE8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "matchCriteriaId": "2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "matchCriteriaId": "3C38C609-242E-4923-A81F-DAFBE7B6A927", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "matchCriteriaId": "A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "matchCriteriaId": "8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "matchCriteriaId": "D7AC7C56-2205-4121-99E2-001A7488E0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "matchCriteriaId": "A1677313-FF8F-493B-9DA3-C78F87581A17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "matchCriteriaId": "4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "matchCriteriaId": "85CA4444-5103-4451-8A7C-F6BBE714BBB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "matchCriteriaId": "FA1EB745-46D7-4088-93C6-E7156520B144", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "matchCriteriaId": "A93010C0-33B3-438F-94F6-8DA7A9D7B451", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "matchCriteriaId": "2A988A78-6B3D-4599-A85C-42B4A294D86D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "matchCriteriaId": "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "matchCriteriaId": "246AA1B0-B6C8-406B-817D-26113DC63858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "matchCriteriaId": "00EE5B42-FF05-447C-BACC-0E650E773E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "matchCriteriaId": "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "matchCriteriaId": "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "matchCriteriaId": "5D616C72-0863-478C-9E87-3963C83B87E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "matchCriteriaId": "CC333B0D-3A0E-4629-8016-68C060343874", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "matchCriteriaId": "6655535C-FF64-4F9E-8168-253AABCC4F5D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "matchCriteriaId": "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "matchCriteriaId": "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "matchCriteriaId": "1EACEF19-83BC-4579-9274-BE367F914432", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "matchCriteriaId": "24128A7F-2B0B-4923-BA9E-9F5093D29423", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "matchCriteriaId": "0990DD71-9E83-499D-9DAF-A466CF896CFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "matchCriteriaId": "9B7FEDEF-9772-4FB1-9261-020487A795AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "matchCriteriaId": "FE7B0F72-DEDF-40C4-887C-83725C52C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "matchCriteriaId": "9568C222-9816-4520-B01C-C1DC2A79002D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "matchCriteriaId": "53A1F23D-7226-4479-B51F-36376CC80B04", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*", "matchCriteriaId": "BAB245C8-9918-41A0-9DFB-A11E4185C87A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*", "matchCriteriaId": "9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*", "matchCriteriaId": "F752A3C8-18ED-4765-B6EC-C664154EB701", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*", "matchCriteriaId": "B4F31C3F-7C0D-4D95-B4B9-89FD38076913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*", "matchCriteriaId": "5BEEE36E-E735-4A33-80B7-9407D072F6BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*", "matchCriteriaId": "2CB3D3DE-21BE-40C7-A510-AC97C92390DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*", "matchCriteriaId": "0D9A9545-38A3-460D-AB1A-8B03BEB405A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*", "matchCriteriaId": "1860D932-777D-41F2-94A2-D14AB1494AA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*", "matchCriteriaId": "75165A10-2FD5-4370-814C-B60FDE339AFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "matchCriteriaId": "65AAC7A7-77CA-4C6C-BD96-92A253512F09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "matchCriteriaId": "FCD16C07-0050-495A-8722-7AC46F5920F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "matchCriteriaId": "01423706-C82C-4457-9638-1A2380DE3826", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "matchCriteriaId": "A881E2D3-A668-465F-862B-F8C145BD5E8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "matchCriteriaId": "3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "matchCriteriaId": "4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "matchCriteriaId": "6602DD69-E59A-417D-B19F-CA16B01E652C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "matchCriteriaId": "05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "matchCriteriaId": "40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "matchCriteriaId": "ED96AC16-12CC-43F6-ACC8-009A06CDD8F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "matchCriteriaId": "2CE9DC29-C192-4553-AF29-D39290976F47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "matchCriteriaId": "F625E647-B47E-404C-9C5B-72F3EB1C46F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "matchCriteriaId": "E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "matchCriteriaId": "B5878612-9825-4737-85A5-8227BA97CBA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "matchCriteriaId": "F453D348-28CE-402B-9D40-A29436A24ECC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "matchCriteriaId": "36322F4B-83D7-468A-BB34-1C03729E9BF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "matchCriteriaId": "0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "matchCriteriaId": "A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2A50E-94FA-44E9-A45D-3016750CFBDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "matchCriteriaId": "5625CAD8-4A62-4747-B6D9-90E56F09B731", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "matchCriteriaId": "43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "matchCriteriaId": "78DE1A01-3AEF-41E6-97EE-CB93429C4A1D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "matchCriteriaId": "410184AF-B932-4AC9-984F-73FD58BB4CF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "matchCriteriaId": "B265F073-9E0A-4CA0-8296-AB52DEB1C323", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "matchCriteriaId": "3F664223-1CBC-4D8A-921B-F03AACA6672B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "matchCriteriaId": "987A8470-08BA-45DE-8EC0-CD2B4451EECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "matchCriteriaId": "8BBC9542-FB77-4769-BF67-D42829703920", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "matchCriteriaId": "74FDC18B-4662-422E-A86A-48FE821C056F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "matchCriteriaId": "CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "matchCriteriaId": "CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*", "matchCriteriaId": "78E4461B-72F8-4F3D-A405-4AFA99EC8A32", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*", "matchCriteriaId": "663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*", "matchCriteriaId": "DAEDED56-9387-4DAC-BF52-C32ECCB7D407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*", "matchCriteriaId": "FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*", "matchCriteriaId": "E57A9B28-734B-401D-B24C-A295F364D8E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*", "matchCriteriaId": "F02289DF-4A02-4602-89B7-E9148236EE1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "matchCriteriaId": "723E7155-493D-4B5A-99E2-AB261838190E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "matchCriteriaId": "82E37264-E4BA-4D9D-92E7-56DE6B5F918F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "matchCriteriaId": "8704BE6D-2857-4328-9298-E0273376F2CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*", "matchCriteriaId": "731F1E65-1D53-443B-8E2F-8AF11191AFA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*", "matchCriteriaId": "02A83822-822D-4A4D-B29B-A5BE6367A7DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*", "matchCriteriaId": "E8C32738-F08E-469C-8DE0-2708F30574A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*", "matchCriteriaId": "B292187E-8EAD-49D2-B469-B14CA0656035", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*", "matchCriteriaId": "C7D131E1-24C1-48CF-B3DD-46B09A718FB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*", "matchCriteriaId": "0ABF1231-73CF-4D1B-860C-E76CD26A645E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*", "matchCriteriaId": "F7F88E38-4EC4-41DB-A59D-800997440C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*", "matchCriteriaId": "32FD6647-4101-4B36-9A9A-F70C29997148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*", "matchCriteriaId": "D248D668-A895-43B3-ADEF-1B22EE7DC76E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*", "matchCriteriaId": "858411B5-E904-45FA-8B33-5CC73B915B22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*", "matchCriteriaId": "6BB9336C-C893-4AB0-9402-868CE9960058", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*", "matchCriteriaId": "A4695F94-7AAE-4219-9EF6-CE6D0838192D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*", "matchCriteriaId": "BD7A0991-73F0-410D-855C-BFC88A66E61F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*", "matchCriteriaId": "FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*", "matchCriteriaId": "9858EAC3-C1CE-449B-A605-FFA337DA825D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*", "matchCriteriaId": "E7A8F905-A4C6-4EC6-B9E8-800948350B89", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*", "matchCriteriaId": "565B48E3-1406-4E3C-B4A5-35865C5614E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*", "matchCriteriaId": "46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*", "matchCriteriaId": "8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*", "matchCriteriaId": "191A094B-E354-4767-AD43-87CE140BF851", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "matchCriteriaId": "C1289B9E-5725-42EF-8848-F545421A29E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*", "matchCriteriaId": "238A21CB-F8C5-468B-B523-6D014E2EA8AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*", "matchCriteriaId": "0DC52CDD-614D-4EA0-8DA8-D71189C42E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*", "matchCriteriaId": "A3A630E1-6CAE-4809-AB18-5002F158AE90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*", "matchCriteriaId": "A67750FF-EF4B-414F-8ED4-299CAF33B0DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*", "matchCriteriaId": "5A82D885-82F5-4755-BC11-5899E28CEE42", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "matchCriteriaId": "88AF1366-8A14-4741-8146-886C31D8D347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*", "matchCriteriaId": "7FD75301-E29C-47DC-B53F-DC44EA0C1885", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*", "matchCriteriaId": "8C944024-BEAA-43AF-A339-FD69C75E8240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*", "matchCriteriaId": "435C69D1-3932-4379-8D18-B1E12D558325", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*", "matchCriteriaId": "3572B700-73C0-41D1-95FD-FE9D5B0C1F80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*", "matchCriteriaId": "97A40DC9-0D4E-4C91-8D1B-3CED95B3952E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*", "matchCriteriaId": "16FB3E4B-05F8-411A-8C86-4ACE03815553", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*", "matchCriteriaId": "8E55EBC1-6F96-47CD-9503-7855EFB07240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*", "matchCriteriaId": "4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*", "matchCriteriaId": "F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*", "matchCriteriaId": "A1789924-FADB-4076-8874-120B29EE6B86", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*", "matchCriteriaId": "BC246667-2F6F-4024-9EAA-2CE3018235C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*", "matchCriteriaId": "B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*", "matchCriteriaId": "1341A5D4-A5CE-4D31-A178-01C3069D7A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*", "matchCriteriaId": "86A5C199-92E5-435C-AC40-175849285104", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*", "matchCriteriaId": "67589F54-0A54-4DE7-9A47-A73DD05F7965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*", "matchCriteriaId": "DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*", "matchCriteriaId": "8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*", "matchCriteriaId": "92C5DC8C-3318-440B-8B29-4827F343927B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*", "matchCriteriaId": "0ECC47D8-F602-4CEA-B19A-209CE76C9D36", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*", "matchCriteriaId": "7514ADD3-DECC-4CC2-9421-A609E526FDC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*", "matchCriteriaId": "691097C3-F91B-499B-BAEB-4E7E9C43B517", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*", "matchCriteriaId": "0B3DB1ED-017B-43EF-92A3-A8A88669FBC2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*", "matchCriteriaId": "19A49AAF-0F08-4151-8F74-4EF9C3415B00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "3F7A2018-BB4D-4DC1-813D-A4AA3F270893", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*", "matchCriteriaId": "A95D91C4-C539-4458-A6C9-8AE17207AE30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*", "matchCriteriaId": "37F9D218-8198-42C7-88FE-7C5382138324", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*", "matchCriteriaId": "CF8FDD81-95EE-4241-93C8-925085A4CE7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*", "matchCriteriaId": "614D9E35-10E0-4CCB-B817-C7C8C3947BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*", "matchCriteriaId": "F75F987E-F4DB-46FF-B048-21B4A4C07B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*", "matchCriteriaId": "05376F2C-30B6-406D-90F7-6C2E00E85171", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*", "matchCriteriaId": "CCDD3DF6-24BF-4C13-8F07-AF07327E5622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*", "matchCriteriaId": "B1520A64-2157-45D7-A135-F900798C4EB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*", "matchCriteriaId": "05A30F85-5367-4369-B7A5-176D71279FC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*", "matchCriteriaId": "B8803FF9-48D7-4AB0-8A17-4590CABD0BFD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*", "matchCriteriaId": "1DC63B6B-5D6D-477B-9125-007F835981B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*", "matchCriteriaId": "BF385AC9-963E-4670-95A6-BE1EBC3890B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*", "matchCriteriaId": "943FA088-2902-45A9-A1BA-D612B46A50D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*", "matchCriteriaId": "8C80902D-9A6C-47D4-B56F-35C378FC0E63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*", "matchCriteriaId": "1100B46C-8485-4048-BFF8-2BAB311EC04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*", "matchCriteriaId": "4B9E1646-E154-41BA-B9FA-0839A898023D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*", "matchCriteriaId": "03F4C8E6-0043-41A8-94EA-EEBAA1A081E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*", "matchCriteriaId": "31C10985-CBF7-4717-A7D6-2594887D7CB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*", "matchCriteriaId": "8C49886C-B6A0-4D95-8533-329FE5A66F6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*", "matchCriteriaId": "0788CF23-3FAF-44C9-9AAA-96E4818A1AEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*", "matchCriteriaId": "24AF7001-64D1-4BFB-9280-0BA0FAD97A0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*", "matchCriteriaId": "8C6E420E-16DA-4FB1-9968-C93E229614FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*", "matchCriteriaId": "07469E04-B3D2-41FE-A2E4-E25A977026CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*", "matchCriteriaId": "60FF402E-5E4F-414A-A3AB-149548303616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*", "matchCriteriaId": "79E2B875-A270-45C0-A1B1-041264E5B290", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*", "matchCriteriaId": "8C828C8C-7ECB-4167-87A9-0F522C400C66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*", "matchCriteriaId": "0C2C887F-1EF7-468A-A6AE-440793C78DAC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*", "matchCriteriaId": "6F2F3D7F-D884-4ACD-A103-060F57A9867B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*", "matchCriteriaId": "BD1FCAAD-7072-45EC-9ACB-08556458BAF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*", "matchCriteriaId": "C4446224-40E8-4AD0-8197-921D3473E19B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*", "matchCriteriaId": "4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*", "matchCriteriaId": "B92B68FD-771A-4401-8B1D-B1A252356F62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*", "matchCriteriaId": "1B933941-0BE3-4EEB-8FDD-2DAA63343EE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*", "matchCriteriaId": "8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*", "matchCriteriaId": "36F737C1-6011-42D2-9690-CA81EA0A283C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*", "matchCriteriaId": "19CA7EB6-D1C9-48D9-A69A-2618800A6CE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*", "matchCriteriaId": "0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*", "matchCriteriaId": "ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*", "matchCriteriaId": "56C909B0-8FB2-4220-AF93-EECB8D650CC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*", "matchCriteriaId": "FF36BAD0-A762-4F84-BE0B-060FE666ED67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*", "matchCriteriaId": "007337CD-94FB-4ED9-B4A3-9E0EC52D79B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*", "matchCriteriaId": "BCDFA137-F1FC-46BD-9872-D62671B1434D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*", "matchCriteriaId": "2E6DBCB3-E912-43A1-914B-5C7CCFAADE25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*", "matchCriteriaId": "0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*", "matchCriteriaId": "E2C67312-E128-4833-A91E-D7A9F96A7AD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*", "matchCriteriaId": "3F19F408-FABD-4A68-8CDC-C763F0321FB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*", "matchCriteriaId": "68A06EC2-E491-4CD5-9904-61A88EBB7FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*", "matchCriteriaId": "789A8CAE-8D9E-4244-880D-FBE28EC53AED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*", "matchCriteriaId": "F901EE11-D0C9-46F6-8316-D8F4F1D50260", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*", "matchCriteriaId": "E549F600-B9CE-4843-A772-2DACC528903E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*", "matchCriteriaId": "3F28E733-87ED-4610-A8EE-BD37BED7685B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2832E8BF-7AC7-444C-B297-66F770860571", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "44AA72FB-E78D-419E-AA82-B0538C6504D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "687C3BF3-D71A-49AD-8A05-EAC07CBCD949", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "90AF90D9-16C4-4F8A-9868-3E2823E3445C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "3C063C53-8970-45B1-85F8-FB2080BF4695", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "64596ED7-794A-4D23-987B-D9AD59D48EA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "A561A8E8-79E2-4071-B57D-590C22EF86A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "92E46658-60AB-4758-9236-3AC0E6464383", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "matchCriteriaId": "207B8FBA-E2FF-485A-9AD9-E604AE0FB903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "33F99640-C753-40BE-A0A1-4C2D92E7DB09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F98247B-1839-4676-855B-827A4B6C016B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDBA35BD-1048-4B6E-96B2-1CFF615EB49A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6CEEEE2-D6A2-4342-8A73-934093948824", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "979FEE9F-A957-43B6-BB6D-1A851D6FA11C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AF59D-D05E-47F9-B493-B5CD6781FDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF7EC93-0170-45A9-86C7-5460320B2AE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5F803AC-DCC7-43FC-BEB3-AA7984E0506C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "560993AA-299D-42B7-B77F-1BD0D2114CCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C582B1C-1DAC-48FD-82DD-7334C10A2175", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7862B0C-2C44-4110-A62A-083116129612", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "048C5996-F719-4338-B148-0DD1C13E02FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF7FB-AB5A-4549-8C15-E69458C649E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CEF6608-B650-4C77-9823-0AD57B3484F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BE6A2D7-901C-45F9-B487-D674047D522E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ADCB509-5B0E-4592-8B23-EC25A3F79D41", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB51691F-089F-4016-B25E-238074B06C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA37503-FD3D-4220-933C-234631D6EDEF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "matchCriteriaId": "72992831-2A76-456B-A80C-944BDD8591E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79C2131-5566-4CC2-B6ED-38E3F6964500", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "matchCriteriaId": "60BFDAA6-3DFC-4908-BC33-B05BAB462F94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6266056-770A-4E2D-A4FC-F1475257648E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "929AA8F3-8BDF-4614-9806-6D4231735616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "605D7552-8184-4B11-96FD-FE501A6C97DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3144BBDE-CC96-4408-AA02-ECC3BF902A34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B8BA77A-34E3-4B9E-822A-7B7A90D35790", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7165B43-ED22-4714-8FA4-1E201D1BFA69", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CFB133-FAF0-431A-9765-8A9738D6D87C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "matchCriteriaId": "2975B0F2-DB7C-4257-985A-482ED2725883", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "70221E07-3C2E-4A82-8259-AD583EB5CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "427DFD78-56CD-43C4-948E-F53AF9D669F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AD7649-3FEA-4971-9886-6C9312B937A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4EE972C-6BAE-4342-BA01-1D685487F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDFE3B-C064-49A9-BD43-3F7612257A74", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BD0EEC1-D695-41A5-8CD6-9E987A547CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF25B8-D474-4C6B-8E45-F57DDC7074E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DF18FD1-6670-4C3C-8000-A079C69D575E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "921EB5A5-F911-4FCE-A6F1-C66818B34678", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "023063E1-2DD7-487C-A8A7-939FAEE666A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "77255CE6-D7B7-4B48-993C-7100A1170BC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40AC368-3A14-4EFF-A8D0-7EFB4C83045D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C07E80D5-70A5-49C9-9044-D683C7ECCFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "63668AF4-F29C-4424-8EC5-2F0A5950DD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86616FE-0C3F-4984-A364-8A6A9F01DAD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C1C7CD-538D-4D7A-A81C-10DF5376A479", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5922F749-2B23-44B8-8A46-F31BCAEAD279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D75D0EEB-707C-4C86-A569-E91E9F00BA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FB0E20-0243-40A1-8DEF-37150791222E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "68CFF26D-8AD3-4179-9E4C-F06D7C858C9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7541572C-229F-4963-B7F0-06EB3323E53B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "matchCriteriaId": "85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "479F7C77-D16F-4E40-9026-3EB8422E0401", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DB08C8-0018-4A8E-A206-097BDDF83B08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7193E85-30BE-42D5-A26B-3F88817F3574", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "446E8515-45FC-4B8B-8D12-60643D64C07F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDF6B2-D388-4639-87D8-064AA3F6B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "00AAB8B6-B614-4EAA-BA90-C5326CB5D07A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A371DF9-E224-404F-99C2-C2A4607E62D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F40E356-365D-44B7-8C38-A0C89DDD6D3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3132029-89F8-4359-A0DC-A275785266A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02F5685-0636-48AB-B222-434CA1F3B336", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ED4693C-DECF-4434-90C0-56158F102E7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB408A6B-0842-43DA-9180-B0A299FCBCE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6215EBAC-7C75-4647-9970-482120897F1F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D1FD6E8-80EC-461F-9ED1-CE5912399E80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E96F585E-BDEF-45EE-B0AB-94FE23753AC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3279C067-3058-4D46-A739-05404FD0E9B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "matchCriteriaId": "DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C0855225-F501-486A-BD03-2A86FD252B5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "matchCriteriaId": "214C7B0C-C438-4000-9F9B-6D83294243AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4C91AA2E-4BB2-49C8-9364-4E363DF42CB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DA26781F-5A1C-4DA5-835E-D984D697F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA4222-F25D-4457-80AA-6D05CA918D68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "matchCriteriaId": "9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "6777AC35-9D1F-4153-94AC-B25627D730E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "matchCriteriaId": "A5F063F4-8994-4E46-BA7B-A12A112009BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "matchCriteriaId": "4D6F2DE5-AF11-439A-8D37-30CB882ECD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E213DD86-5419-42C8-BF38-7795DDB3C582", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A972291E-5231-439D-873B-2F87BCAF800A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C089CC54-3229-43D7-AA15-73CFA1A43EE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "matchCriteriaId": "EF268D83-C15D-4559-A46F-844E1D9264F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CFE97C0D-3EA1-4314-A74A-7845C7778FB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "matchCriteriaId": "34293F29-F327-4ADD-BF62-78F63F79BB96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "matchCriteriaId": "528C0A46-1CC4-4882-985A-0BB41525BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "matchCriteriaId": "643F3522-A452-4927-944D-532574EC4243", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "matchCriteriaId": "58F40B78-4DBA-44EE-8420-086789EFF53D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "matchCriteriaId": "423BFD8F-4B50-43DA-9979-75FD18FBC953", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8BAD4A68-0481-476F-BBBD-3D515331368C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "matchCriteriaId": "838CEB7C-7C4C-416C-86CE-6E8DD47EF25B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "matchCriteriaId": "CC7D021F-3C97-45B3-B1F7-0AC26959F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4A31AEF3-448D-417B-9589-4BA0A06F2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F7A1D96F-7FFD-413F-ABCE-4530C3D63040", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "matchCriteriaId": "4B8343FE-1320-40AE-A37F-70EF1A4AC4B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD42BA5A-7DA0-409D-8685-E43CF9B61D9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A5FF80E9-CF28-4EF6-9CFE-4B500A434674", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "matchCriteriaId": "647B77A4-2F49-4989-AF43-961D69037370", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "matchCriteriaId": "805B1E33-F279-4303-9DF3-C81039A40C1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "matchCriteriaId": "B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7E0AAE-6539-4024-9055-BE0BAD702143", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7F1A8828-0765-4799-AD6C-143F45FAAD23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "matchCriteriaId": "12D34618-1CCA-405B-A49C-EB384A09C2C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "575D6061-66BC-4862-BC84-ECD82D436E2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "matchCriteriaId": "56B6EE64-1AD4-46B2-BA65-BB6282E56EB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "matchCriteriaId": "11650B45-0BDA-42BF-AEF3-83B48DD6A71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "matchCriteriaId": "BD3C92BA-827B-48AF-BBB3-FB60A9053C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "matchCriteriaId": "AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5EB44CA7-DFE6-4B1A-9A63-97AE30017E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4B305EFA-6226-412C-90EE-F0691F2DDDE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "matchCriteriaId": "7F3874FA-63CB-4B5D-8B64-CE920320A4E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "matchCriteriaId": "0800ED17-50E4-43F3-B46C-591DFA818BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "matchCriteriaId": "A46B0405-F301-4209-8766-6E12EAFAD157", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F99F9F1F-A967-4884-96CF-4488102DC0A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "matchCriteriaId": "DA9B37AD-4599-425B-B39F-E571F4975266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C5A5F1CF-A1E6-45F1-8B09-36566778DB57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "matchCriteriaId": "698C8A49-888B-4675-B3B0-25EDE2FD515E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "matchCriteriaId": "70D98F97-8EF4-48B5-84BE-C3CC27031FDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "matchCriteriaId": "B473D1FA-909B-492E-9C5B-94B0E20E1C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "matchCriteriaId": "BFD5EA7E-322E-4CE6-89D4-7DB1055C9034", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "matchCriteriaId": "67836379-4E1A-45CD-9506-7D3F612E47C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "matchCriteriaId": "5B1BBC61-8664-4452-93A7-DDB4D2E4C802", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "044F0375-DF2F-4D9B-AD7E-473D34165E8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "matchCriteriaId": "2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4A0655CA-A88C-4632-9A18-560E3F63B2F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "matchCriteriaId": "8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C6965851-3B29-4C21-9556-97FD731EAA85", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "matchCriteriaId": "52984FD2-44E0-4E91-B290-0376737EEF6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DF933366-7503-4F8D-B7AA-F6A16210EC37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4E2DAF5D-5BB7-49C6-8426-8B547505B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3EABB21D-D021-434B-B147-CAF687097A5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "matchCriteriaId": "7609424D-95F1-4493-A20C-B1BA4EC6439D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "matchCriteriaId": "966DC636-C802-4D9F-8162-652AFB931203", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A75794EB-A5AF-43F0-985F-D9E36F04C6D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "matchCriteriaId": "31C2CFF0-98FD-4A0D-8949-D554B2FE53D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "matchCriteriaId": "05F9217F-5028-4659-AA8E-F60548DE4D52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4AC769DC-CF2E-4A3C-A610-264F024E6279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "matchCriteriaId": "9B2B1CBF-D155-49BC-81A4-4172F177A5C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "370B2B32-519E-4373-8A04-5C5025D688BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "83D9B562-C279-4A55-A347-F28FC4F9CD12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "2A8C2BA0-48A8-4107-8681-A7C34C553D8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "B1B009DE-A82F-4569-9B42-EC1EC4DA8A40", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "683B6E83-37FF-4F9B-915F-059EBB29DB53", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E218718F-4BE6-48B0-A204-9DD4A932A654", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FB0AB327-B60A-473C-9D36-97766EE62D7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA249EE-4786-4E27-8787-5E8B88C2AEB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBD0529-1CF3-44E5-85B3-19A3323C9493", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D664EE97-07EC-410F-94C3-AEAB2C6A627D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "D31DB981-03B1-4A84-8D87-CD407C3C149F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CBD155D-89D9-4677-A621-4D7613BE65C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02BD0D4-FFFD-4355-97D8-170362F10B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6635781A-2651-4EF2-A5AC-AEEEE63FDE6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DCE6930-760A-48C0-B964-1E3ED6A8517C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E52DE90-DF96-4CE7-B8D1-226BA50E4D09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8EB40E7-9B91-4106-B303-2B70AF395BFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB0D5CD-8AF3-409D-96A7-718641D4B90D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E420B0B-0CD5-41C7-B25A-3DB856055F9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B0C295B-0D63-4BE7-830D-D927E00C301C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "matchCriteriaId": "605C340D-2220-4669-B827-9009CB099E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8791879D-2908-4F57-8DB3-6D24100A9108", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E823DC5B-98BE-4656-BFBF-3A7018F8F213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E8D558-ADE0-4358-9C76-7BD77BF23AA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7973B3D0-F244-4E26-88F5-A2D9BF2E4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "matchCriteriaId": "68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5CB567-4F86-4466-BE4D-BFF557ACAE0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A52611B-6583-4660-90D7-C9472728072B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E80C6E89-B57C-47BB-8B95-50C03DFB3B96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9AB685B-FEE1-41EF-A046-1B34619E12A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB9F6724-967A-4AF0-9896-12BF6164B2CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC1116BF-12D7-47CC-98DB-18B200CF9C16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FBB28DE-726B-4AF0-88A5-35987E1E648B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1880E2B8-5E0E-4603-8D17-3ABA43D28179", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FAFBB92-1917-4238-832B-195FBE418271", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "91DFDF3F-9A3F-42B8-99A1-A3F76B198358", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "matchCriteriaId": "8778F972-BF34-482F-9FA7-71A77F6138E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F288BB0-FE7A-4900-B227-BE80E4F4AADF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E16338-A094-4CA9-B77F-6FE42D3B422C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E07AB33-5351-487D-9602-495489C7C0B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "matchCriteriaId": "22115ED6-1707-4840-B0D1-AD36BC0C75A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C633BC-831F-4CB7-9D62-16693444B216", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD501E1-E78F-44C6-8A13-C29337B07EBE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "matchCriteriaId": "9085BA0B-B7E2-4908-90C0-B4183891C718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "matchCriteriaId": "81971C2F-137A-4F11-8C93-3B99D4CD1B58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E0BDAC-398E-406B-B2DB-AE049D6E98B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFDE6C-DE58-4C4D-882E-474EF6C3D934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "matchCriteriaId": "950C6BF9-AA47-4287-AC01-D183237490FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2355181D-D8EE-4F80-8280-13D5CBCF4779", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5209343F-66B0-4DC0-9111-E2E64CFF7409", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "720109A6-B79E-48E1-9AE7-7708B154788E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "82FF0DBD-AE13-4232-80F7-F4C2E2CC9721", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E944ED-8C02-46B8-BF95-0CE4C352753B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "matchCriteriaId": "77AEA3D1-4846-46E2-9B80-20B19F00DC11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1576978F-E93D-4A47-90B6-6A4E3A7DE558", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D339FE5-001F-4005-88A5-CFFE37F9B63E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BDABA86-497E-497E-A5BA-46F913A4840A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD886F4C-DB6F-4DDD-9807-8BCBB625C226", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4C454B7-E5F4-4AAE-B577-FD71FA002C8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "38BE2781-3A06-4D62-AC8B-68B721DA526B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DA23772-2EB8-4BEE-8703-26D967EC4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "72DC766A-B1F9-4B83-9F9B-CF603EE476BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA594740-43C5-4F42-BA5B-00CA8AE7BB60", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "572B16E2-8118-43A0-9A80-5D96831D55FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB5C551-BADC-4A3A-93E5-2EBCA0704C51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5383B7A3-1569-4FEB-B299-B87CE8C8A87B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A05BBDE0-6C47-4489-9455-7DA7D230ECA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "matchCriteriaId": "1789AA69-EA31-44D1-82E6-228E48E18586", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A7D5FF-3B1F-4C64-BB81-7A349765520D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F0498B3-393A-4C32-B338-E6014B956755", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C451F752-6869-4AFA-BAE5-5C9A54427BF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "83710FD1-099B-436D-9640-061D515E10BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "517B71CE-6156-40E1-B068-A2B733E205E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "11DEEEE5-5055-4CE1-962C-C5F075F4CC02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "matchCriteriaId": "8718DDAB-3208-48CF-9BCE-54DA1257C16A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1AA901-E822-4240-9D82-C9311E4F87B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1CDE3DF-8E79-4997-94EB-B517FFCAE55C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "12A0DE13-EB0B-493B-BC84-3AEB3D454776", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "matchCriteriaId": "1727697B-1F59-4E29-B036-C32E9076C523", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E69E827C-C0D0-46C7-913A-1C1E02CEAACE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2528F3F9-34DC-41DA-8926-382CB3EF5560", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E452C262-5A8D-4D97-BC7F-A4F5FF53A659", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D57BF69-D750-4278-98AA-976B0D28E347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "76ADAE30-6CAD-4F5B-B6F7-C18953144C63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A25D792-E21D-43EE-8B9D-67DE066DE5DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C669783-C058-4B4F-BB9A-84B2C4682247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "matchCriteriaId": "159B088B-9A85-4CAA-854A-AA080E528F95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBE74A94-FE8F-4749-A35A-AB7D57E24913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "990AC341-0E67-4A81-87E9-EE3EFD9E847E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BC18B0-58F1-4477-9978-CA7383C197FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "matchCriteriaId": "474992FB-842D-4661-A565-44AF2CD78693", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "476E1B79-5342-4895-96D7-E97DFC1F5334", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD318D5-89A6-4E28-939C-C5B61396806B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32C7E89-32ED-4328-9313-FA7D3DDBDC58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2792EED8-2CBD-478E-BC09-05FE830B3147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B1AF2F-6E48-4DBD-A60E-3088CA4C3771", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "matchCriteriaId": "34E1691D-65B3-45E4-A544-8B29E38D569D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "matchCriteriaId": "E42F2703-B8AB-410E-AF7B-CD0BE777F061", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "matchCriteriaId": "31244C94-00A3-499C-A91A-1BEF2FB0E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "matchCriteriaId": "878FF6E8-8A6D-44CE-9DD1-2C912AB8A193", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5078A95B-2BD8-4A37-A356-F53D1A53CB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "matchCriteriaId": "0BFE67CD-DE53-4C4E-8245-35902AEFA6E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "matchCriteriaId": "9F231D31-3AAD-4C5D-A225-D2DF94486718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5998DF5D-E785-45EC-B8D0-1F4EC4F96D50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "EADFD013-0BFB-427C-98E6-F9E4774DCBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "58620B10-FEA6-456D-B6B5-2745F5DBE82D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "matchCriteriaId": "E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4858A1F0-97F2-4258-AB98-027BF1EC5117", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3C961A8B-EAFD-4F66-9432-BCC0D154ECCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "matchCriteriaId": "052DE6CD-A1E7-4E81-B476-66EF451061C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "matchCriteriaId": "3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "matchCriteriaId": "751B3AC8-D45E-46B6-83D5-311B693F3C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "matchCriteriaId": "9588277A-0B97-4408-9CF7-11271CDAADD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "matchCriteriaId": "479FE854-85E5-4ED0-BFAF-2618C9053082", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "matchCriteriaId": "E048B9BF-77C8-49F7-9F2D-9999F79BA264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "matchCriteriaId": "6CD16D4D-E816-486D-96F4-5A2BF75B959F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "matchCriteriaId": "169C558E-1A83-47D5-A66B-035BD1DD56FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "matchCriteriaId": "D683E509-3FB2-4175-BCAB-4EB1B5C04958", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "matchCriteriaId": "6FCFA915-5445-4732-9F8F-D7561BA4177F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "63A9FD98-C22D-48F6-87A1-60791C818A1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "matchCriteriaId": "85F99F24-1783-4E6E-BE61-04C2E80356ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "matchCriteriaId": "74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "matchCriteriaId": "85289E4C-C813-4677-867D-EE8E98F4A1A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "matchCriteriaId": "27C8150F-BEFA-406D-9F0D-E7CB187E26AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "matchCriteriaId": "1E807F90-819F-4103-B1F7-4CE46971BD63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD93203F-71B9-4F87-B5D8-FD273451C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "1E652C74-C48D-4F29-9E85-09325632443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "99158191-3013-4182-8A53-5DFCA1E2C60A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "matchCriteriaId": "F7E39A3E-7EAE-47C9-930B-58A980B73FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "matchCriteriaId": "FFDA54BA-C00D-4890-9B7F-328257607B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "matchCriteriaId": "1F5EFB1E-334C-4B55-8E2E-6AE19B34774D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "B8260DCA-2F0C-45F7-B35F-D489AF5639F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "matchCriteriaId": "7778F81B-6D05-4666-B1D4-53DB0EC16858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "matchCriteriaId": "5DC6706A-61F7-4AA0-B2FF-0FFDF739A644", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7EF1B16B-02F2-4ECA-938E-B5CDCFC67816", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3C5501D8-1B0D-4F5A-AFD7-C63181D3281F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "matchCriteriaId": "1751F0CE-A0D3-40E2-8EEC-D31141FE33A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5FF9AFA7-BBE8-4229-94CB-5A9596728BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "matchCriteriaId": "E23A777F-68A4-4217-A75A-4D8A27E6451A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "matchCriteriaId": "2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "392A4337-11F6-4980-A138-4FDBCAD0EBA4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E2E9BB67-F1FF-4190-889F-78B965CCE934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "matchCriteriaId": "F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "35607317-0928-4297-A33E-D44BEE1BBEC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "matchCriteriaId": "D48323B1-7FEB-451F-A064-23E7CE7F6403", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "matchCriteriaId": "29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F5763189-7980-4A72-92C9-1908FE9E15EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "matchCriteriaId": "C53ACD49-DA21-4DDE-A0AA-FCCD59D29886", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4326D350-EBC2-48E6-A2C6-0499F6826CEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8594E6FE-B6DB-4343-B3DD-AEC19923DAF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5BCADA00-E453-414D-9933-FCB43D21BBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E62212D9-F707-4A8E-AB2A-A3985E7A4049", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "matchCriteriaId": "561755A8-8AAD-4F41-8266-747EFDAF2D55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "matchCriteriaId": "E6F4BB0F-DAF4-479B-B78A-7929C151AA1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "matchCriteriaId": "A207312E-1D35-4464-A111-22C4C793E146", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E9B16E32-07D5-445B-BAA5-4E4A0881BFC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7CF08F6B-2ECB-414C-82D7-C06085BF8B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "matchCriteriaId": "21032BE3-74D8-4C3F-B461-158F475B6853", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*", "matchCriteriaId": "F6E468FE-73BE-4B20-B774-58EC7CD20CDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*", "matchCriteriaId": "0FF6B19B-7D45-44B3-8524-407253B93EEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*", "matchCriteriaId": "2B803FAD-E54D-49FE-A078-029B8FFBBB98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*", "matchCriteriaId": "CC511505-ED67-45B4-B76C-56AB750C4408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*", "matchCriteriaId": "A430C232-79EB-4264-AE24-41D4A2A5D990", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*", "matchCriteriaId": "3A9E3D4B-A3DF-4858-8C64-0316B6E57435", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*", "matchCriteriaId": "19108672-E1AA-41CC-B86C-061D3721C8B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*", "matchCriteriaId": "200D36CF-AEDE-4183-8C54-748E6E5A3218", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*", "matchCriteriaId": "4CF13A44-5163-4282-8EE8-7DC05499B5E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*", "matchCriteriaId": "827C12CE-D87D-489D-ABA7-BE0405EC33D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*", "matchCriteriaId": "16AA78F7-520B-4FFC-838C-DC74FEE8E13F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*", "matchCriteriaId": "C850453B-CDB1-490D-B551-9AC0B27D8A67", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache." }, { "lang": "es", "value": "Los sistemas con microprocesadores con ejecuci\u00f3n especulativa y predicci\u00f3n indirecta de ramas podr\u00edan permitir la revelaci\u00f3n no autorizada de informaci\u00f3n al atacante con acceso de usuario local mediante un an\u00e1lisis de la cach\u00e9 de los datos." } ], "id": "CVE-2017-5754", "lastModified": "2024-11-21T03:28:19.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "[email protected]", "type": "Primary" } ] }, "published": "2018-01-04T13:29:00.303", "references": [ { "source": "[email protected]", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "source": "[email protected]", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "source": "[email protected]", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "source": "[email protected]", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "source": "[email protected]", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "source": "[email protected]", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "source": "[email protected]", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "source": "[email protected]", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "source": "[email protected]", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "source": "[email protected]", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "source": "[email protected]", "url": "http://www.securityfocus.com/bid/102378" }, { "source": "[email protected]", "url": "http://www.securityfocus.com/bid/106128" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040071" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "source": "[email protected]", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "source": "[email protected]", "url": "https://cdrdv2.intel.com/v1/dl/getContent/685358" }, { "source": "[email protected]", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "[email protected]", "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "source": "[email protected]", "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "source": "[email protected]", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "source": "[email protected]", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "[email protected]", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "source": "[email protected]", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "source": "[email protected]", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://meltdownattack.com/" }, { "source": "[email protected]", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "source": "[email protected]", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "source": "[email protected]", "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "source": "[email protected]", "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "source": "[email protected]", "url": "https://source.android.com/security/bulletin/2018-04-01" }, { "source": "[email protected]", "url": "https://support.citrix.com/article/CTX231399" }, { "source": "[email protected]", "url": "https://support.citrix.com/article/CTX234679" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "source": "[email protected]", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "source": "[email protected]", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "source": "[email protected]", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3522-3/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3522-4/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3523-1/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3540-2/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3541-2/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3583-1/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3597-1/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3597-2/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/usn/usn-3522-2/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/usn/usn-3523-2/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/usn/usn-3524-2/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/usn/usn-3525-1/" }, { "source": "[email protected]", "url": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin" }, { "source": "[email protected]", "url": "https://www.debian.org/security/2018/dsa-4078" }, { "source": "[email protected]", "url": "https://www.debian.org/security/2018/dsa-4082" }, { "source": "[email protected]", "url": "https://www.debian.org/security/2018/dsa-4120" }, { "source": "[email protected]", "url": "https://www.kb.cert.org/vuls/id/180049" }, { "source": "[email protected]", "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "source": "[email protected]", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "[email protected]", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/102378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cdrdv2.intel.com/v1/dl/getContent/685358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://meltdownattack.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://source.android.com/security/bulletin/2018-04-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.citrix.com/article/CTX231399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.citrix.com/article/CTX234679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3522-3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3522-4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3523-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3540-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3541-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3583-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3597-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3597-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/usn/usn-3522-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/usn/usn-3523-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/usn/usn-3524-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/usn/usn-3525-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.kb.cert.org/vuls/id/180049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*", "matchCriteriaId": "8F249992-79C7-4005-9804-97FFFAC658E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*", "matchCriteriaId": "81C6DAFF-FD39-434C-8426-4BE5F39355EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*", "matchCriteriaId": "2EE259EF-22F6-4AA1-BDF6-448E15B96F14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*", "matchCriteriaId": "EFED12C9-2563-4036-BEBC-DD9D67095917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*", "matchCriteriaId": "18155178-43F1-48A6-AC0E-9578031F7F04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*", "matchCriteriaId": "4C47688B-1D40-4D73-B363-E2E8230588FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*", "matchCriteriaId": "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*", "matchCriteriaId": "72BF929E-1288-448A-83A4-D26D86D26EF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*", "matchCriteriaId": "C8E4CB07-1768-4C18-ACAD-73773042C752", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "31465D8E-A705-4AE3-AB2A-C296554E514C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*", "matchCriteriaId": "D8B2D356-DD32-46E0-9459-67E10AE44104", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*", "matchCriteriaId": "27CDF6AC-7356-417F-84F6-33E9E3AA2082", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*", "matchCriteriaId": "E8E6F0AF-78AC-4257-9164-A9A4CCA05968", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*", "matchCriteriaId": "5DA61740-3E29-4820-9897-9BCB90490D49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*", "matchCriteriaId": "633350BA-34B4-4927-82B9-B44D1286D8FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*", "matchCriteriaId": "D2E687A6-87AA-4F3A-98AB-A164EC0EE051", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*", "matchCriteriaId": "53A8F993-32F4-487A-A33D-814BCDF1FAB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*", "matchCriteriaId": "09EC7A10-C2AB-4DD4-9C75-073344F635E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*", "matchCriteriaId": "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*", "matchCriteriaId": "0C83B3D2-E293-4D33-AE5B-1789466696DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*", "matchCriteriaId": "CB399F3F-7C6E-463E-B822-A4365A4C290A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*", "matchCriteriaId": "F5175C41-110B-4C26-80CB-C25DA11F639B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*", "matchCriteriaId": "63DAF721-A7E8-4263-869D-D9E100D7C598", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*", "matchCriteriaId": "F79057F7-72D3-4176-BBDD-E9A362153E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*", "matchCriteriaId": "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*", "matchCriteriaId": "FD65648B-B7DB-432F-8F88-6C624F94F809", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*", "matchCriteriaId": "7A949D34-E086-4821-B73A-DCCFDD6C5616", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*", "matchCriteriaId": "93055544-064D-46FE-92E4-48F69DDD29B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*", "matchCriteriaId": "9A98184C-18F5-424C-BB74-9A8094B5992C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*", "matchCriteriaId": "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*", "matchCriteriaId": "3EB52214-6E22-49BF-B2F6-0AA282108E0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*", "matchCriteriaId": "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*", "matchCriteriaId": "F8E0DA72-76B5-4022-BBFA-B886F0F662CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*", "matchCriteriaId": "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*", "matchCriteriaId": "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*", "matchCriteriaId": "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*", "matchCriteriaId": "0F67F016-A068-4079-AAE5-B247BBAE1B2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*", "matchCriteriaId": "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*", "matchCriteriaId": "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*", "matchCriteriaId": "DD57E072-FF46-4637-B7CF-D6C2F3BA8782", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*", "matchCriteriaId": "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*", "matchCriteriaId": "4B18E14C-4DC4-4AEB-8792-968D893BA402", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*", "matchCriteriaId": "B706F7E4-8169-48A5-86D1-3592D3D9B845", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*", "matchCriteriaId": "808DAAA6-9047-49A1-BC0B-9D4725299CA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*", "matchCriteriaId": "57EFA3F2-5C76-48AF-931F-7463633370A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF59F0-9F30-448F-A109-B90FCC513CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*", "matchCriteriaId": "07EFB7B3-772A-476D-B30F-2A442F64928F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*", "matchCriteriaId": "41A69B9F-EF79-4642-A2A8-75395AD7506E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*", "matchCriteriaId": "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*", "matchCriteriaId": "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*", "matchCriteriaId": "6C6D7877-1990-481F-9CFF-81A2BD39DA6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*", "matchCriteriaId": "6A17D56F-D53C-4198-B7EF-95BAA4711B3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*", "matchCriteriaId": "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*", "matchCriteriaId": "E13892FB-C1D0-4C46-A171-9D055E58DE0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*", "matchCriteriaId": "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*", "matchCriteriaId": "DB830245-29AF-4F0E-9C12-6BED7E76609D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*", "matchCriteriaId": "17ACD170-347E-4DF5-AE0D-DF00854480A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*", "matchCriteriaId": "3B8BCF08-D863-435F-9E70-78C7542A3C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*", "matchCriteriaId": "9E57F037-EE11-4148-A214-0650A98A07F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*", "matchCriteriaId": "F641F2A7-64C7-43DB-862B-B7117E1B9CBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*", "matchCriteriaId": "51086E20-8A3D-4A68-8048-D385865D50FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*", "matchCriteriaId": "2621BF41-EFD1-4C8A-9426-A937B68DC71E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*", "matchCriteriaId": "713DC902-5264-42CB-BB22-3566A4528FED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*", "matchCriteriaId": "28554810-9989-47B2-9CF1-E421D534777E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*", "matchCriteriaId": "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*", "matchCriteriaId": "4DD23345-C583-4E30-A9FE-B0C485606ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*", "matchCriteriaId": "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*", "matchCriteriaId": "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*", "matchCriteriaId": "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*", "matchCriteriaId": "E8BBEBBD-8F88-474B-A40B-7270B500AAC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*", "matchCriteriaId": "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*", "matchCriteriaId": "7471E5CD-7211-474C-856F-51C199479407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*", "matchCriteriaId": "E785FA6F-A7BE-46A3-B384-029E55793DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A4148-B91B-4799-B055-21F4A7FA74A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*", "matchCriteriaId": "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*", "matchCriteriaId": "353E8397-B63B-4879-9D3D-610F65929184", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*", "matchCriteriaId": "D91D2C07-10D0-49F0-B353-19E34C438CEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*", "matchCriteriaId": "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*", "matchCriteriaId": "F18363D9-C7D8-4C9F-9A50-33725FFE6558", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*", "matchCriteriaId": "267E5275-7D50-4EF6-AB1D-7ECA894ED71B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*", "matchCriteriaId": "06B91A77-76F0-41CA-B23B-69F431F0D1AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*", "matchCriteriaId": "D9F01332-C259-4F3B-ABE9-C34DAC18FC18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*", "matchCriteriaId": "B9EA80D9-6A3B-42AF-B609-7429755BE504", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*", "matchCriteriaId": "40B500EC-20B8-42D2-A5DF-956C96FBEB12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*", "matchCriteriaId": "D55B01E2-6783-494E-BCB9-C75D2CA042D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*", "matchCriteriaId": "8D31A976-9C00-42AC-8DA1-D8B39564F456", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*", "matchCriteriaId": "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*", "matchCriteriaId": "A90F5756-47A1-4512-848E-3070E42506EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*", "matchCriteriaId": "FDB161B7-D329-41FB-97C3-2C1EB16F74C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*", "matchCriteriaId": "923D2D73-F953-44D2-9A25-E118136E8C5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*", "matchCriteriaId": "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*", "matchCriteriaId": "AE2AEDB1-8C35-4210-B045-69216480B384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*", "matchCriteriaId": "484C1B49-7D90-4360-BE33-C1DAB755ED89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*", "matchCriteriaId": "C08FE92E-D97F-40E1-8482-1DA777EBC785", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*", "matchCriteriaId": "2EBD6720-F788-4FD7-BC7F-AAEFAA137486", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*", "matchCriteriaId": "08032549-991F-465D-8794-21C8ED2C98D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*", "matchCriteriaId": "94514F41-CDCF-4EED-896E-8B5AE7360F0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*", "matchCriteriaId": "27F79141-5702-4157-8D13-FFB1C2F23FA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*", "matchCriteriaId": "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*", "matchCriteriaId": "FF8D239C-B3D6-4F08-AF99-E64752B72346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*", "matchCriteriaId": "207507FE-1DC7-4569-A5A9-392290622EC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*", "matchCriteriaId": "15FC32E2-9228-4903-9F0A-AF327A1C2D36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*", "matchCriteriaId": "FF50D5C4-DFC1-4306-B2C8-09D6788904FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*", "matchCriteriaId": "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*", "matchCriteriaId": "62783CBF-1299-4045-A0D9-E95E7B385164", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*", "matchCriteriaId": "3B04C754-50CD-4C8C-B56F-A50944EE5799", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*", "matchCriteriaId": "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*", "matchCriteriaId": "23BA712E-4516-4823-8E85-6AC24BE3240F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*", "matchCriteriaId": "7C1303D7-33B3-48AA-BD62-74984AD22AF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", "matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", "matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", "matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", "matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", "matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", "matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", "matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", "matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", "matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", "matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", "matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", "matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", "matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", "matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", "matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*", "matchCriteriaId": "8E0195D5-380D-401F-92EB-37AEA34E7478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*", "matchCriteriaId": "0E6AB8D9-FEA0-4830-941B-A2605830ADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", "matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", "matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", "matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", "matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", "matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", "matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", "matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", "matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", "matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", "matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", "matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", "matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", "matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", "matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", "matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", "matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", "matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*", "matchCriteriaId": "E40BD777-F766-4921-951C-7E38575ADA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", "matchCriteriaId": "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*", "matchCriteriaId": "55B1DB28-A0BE-40C5-BA4D-50354A085893", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*", "matchCriteriaId": "47859796-AA68-4E49-A625-9CBB49E5967A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*", "matchCriteriaId": "7FB51313-4B56-4045-A5A9-A2F2C1D21548", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*", "matchCriteriaId": "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*", "matchCriteriaId": "719CAF85-B1F1-4BF9-9217-6181339B20A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*", "matchCriteriaId": "F908E2B8-B4A1-487A-820D-57B1AC437754", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*", "matchCriteriaId": "ACDAC96E-D749-47E0-8DE4-BA0C74027330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*", "matchCriteriaId": "461A6DF4-EC6D-4DC8-A474-B219AE372FA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*", "matchCriteriaId": "60B23D94-D9F7-4EDE-9641-CE5670EB78C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*", "matchCriteriaId": "6F03C408-C457-4306-B26B-D21056B57AB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*", "matchCriteriaId": "2FB20448-852D-4B59-9517-DCF738140F79", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*", "matchCriteriaId": "5D2A6907-9CE2-465C-89EA-F1B84B31768D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*", "matchCriteriaId": "B3420C39-8177-445E-8501-49A4ED3998BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*", "matchCriteriaId": "049D03CC-7D4A-4D64-A3F4-0138717433CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*", "matchCriteriaId": "ACED82AA-7C7D-4089-9129-579CC6B063FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*", "matchCriteriaId": "24761232-F2C3-421D-A6AB-6FC100FE9B1D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*", "matchCriteriaId": "AAC00AAC-243D-437D-B613-1CF97CA58253", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*", "matchCriteriaId": "832281CF-98D7-42FF-8CF1-97632F8F7834", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*", "matchCriteriaId": "AE46D028-025E-4D37-9DF6-9BF385246923", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*", "matchCriteriaId": "3462E847-5100-4C4E-AE79-81D2857280AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D80BA-B6EE-451A-9D40-808B20E7B17A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*", "matchCriteriaId": "A65D4242-CBA6-413D-846C-72772C96E14D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*", "matchCriteriaId": "238B7D82-E552-46D5-9F66-1363F1610BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*", "matchCriteriaId": "6424D4A6-732D-4D4E-B099-E38FBFE1CF38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*", "matchCriteriaId": "177CA640-399E-4343-8DBB-E105E188CE3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*", "matchCriteriaId": "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*", "matchCriteriaId": "8C43C5A6-31B6-4946-90DA-60BBBA03861D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*", "matchCriteriaId": "CE15099D-6718-4AF8-BA3B-57DE1FE71289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*", "matchCriteriaId": "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*", "matchCriteriaId": "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*", "matchCriteriaId": "2B1BE9EE-4403-4983-89CD-A85C77846861", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*", "matchCriteriaId": "D28279AE-D876-4692-A54B-01CCD57AB61D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*", "matchCriteriaId": "E947FE61-02BA-46DB-AD95-692E33F74E6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*", "matchCriteriaId": "BD67AE51-56B8-473E-B5A3-89753D98481B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*", "matchCriteriaId": "47FC1445-5032-4BF1-9A1E-AF078BAC7676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*", "matchCriteriaId": "84181B90-DEEB-4291-86F7-7C65B51FBBEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*", "matchCriteriaId": "5A72734A-69D0-4FD8-95E8-997BC06B9676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*", "matchCriteriaId": "92C1C2B4-0431-48B9-AEA9-F6925268DE92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*", "matchCriteriaId": "A15B8BA9-3C75-492F-8105-C5F563653A1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*", "matchCriteriaId": "D670832E-8CB5-4861-8001-2E317CE7526C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*", "matchCriteriaId": "05DEAC21-5D6B-4224-BC50-54368CD9ECA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*", "matchCriteriaId": "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*", "matchCriteriaId": "6213C0D4-B0F4-4156-A467-4F29FA0E6093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*", "matchCriteriaId": "4288A260-F478-46A2-B18D-BD9CD797FE5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*", "matchCriteriaId": "159865EE-8852-4CBE-A3E3-D97C0D9CD89A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*", "matchCriteriaId": "1479FE1F-882C-4EA3-A05B-B5901D14D9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*", "matchCriteriaId": "BD701852-1959-429B-A631-2FE8390FFA31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*", "matchCriteriaId": "F687C73A-35F2-45A2-91E6-A43DCFAD463F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*", "matchCriteriaId": "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*", "matchCriteriaId": "02D3D433-30D2-4EBB-869A-79BB4B0AA879", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*", "matchCriteriaId": "D4701873-F7AA-40B8-AFD9-4A60D118574E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*", "matchCriteriaId": "77447A8E-7EAA-47A2-BA7A-434F7111693B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*", "matchCriteriaId": "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*", "matchCriteriaId": "777E076D-285A-4CA5-8886-080BD505DB42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*", "matchCriteriaId": "4FC42173-AD0A-40F4-8ECC-17B815F047B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*", "matchCriteriaId": "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*", "matchCriteriaId": "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*", "matchCriteriaId": "F8CE80B4-02EE-4CF5-B944-860AB16BADC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*", "matchCriteriaId": "BACC17D3-E255-4CCD-86BD-AADC9EC48E80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", "matchCriteriaId": "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", "matchCriteriaId": "580DF3D2-C365-43AF-9A48-F173072AA40B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", "matchCriteriaId": "32AD0A43-28BF-48F4-B363-F7A3A1BFE296", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", "matchCriteriaId": "9A747F9D-9761-4B8E-B01C-42018B25245A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", "matchCriteriaId": "DDA4CA91-DA96-4466-8969-3570C8E4343A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", "matchCriteriaId": "ECF29446-F253-438C-B1EA-B606186855FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", "matchCriteriaId": "C08277EA-676A-4D45-B66D-2488308CDEEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*", "matchCriteriaId": "994C51C8-AD87-4CDB-8EBD-4488D7604BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el manipulador HTTP en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x y 11.x podr\u00eda permitir que un atacante ejecute c\u00f3digo arbitrario mediante la misma subred." } ], "id": "CVE-2018-3628", "lastModified": "2024-11-21T04:05:47.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }, "published": "2018-07-10T21:29:00.857", "references": [ { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.6 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "matchCriteriaId": "CD028C10-FD07-4206-A732-CCAC1B6D043D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "matchCriteriaId": "704FAA50-1B7D-4917-AC4A-4C58785340F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "matchCriteriaId": "5C6B95D3-75BD-4826-BFBE-9701CC0FF052", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "matchCriteriaId": "F66E31A6-EA01-40C8-8718-CE2C1F45EEB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "matchCriteriaId": "DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "matchCriteriaId": "022F2CBE-EFB1-4962-AC91-D25AAB057DAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "matchCriteriaId": "69C05CD9-551B-46EE-85F8-D18FF878FE8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "matchCriteriaId": "2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "matchCriteriaId": "3C38C609-242E-4923-A81F-DAFBE7B6A927", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "matchCriteriaId": "A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "matchCriteriaId": "8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "matchCriteriaId": "D7AC7C56-2205-4121-99E2-001A7488E0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "matchCriteriaId": "A1677313-FF8F-493B-9DA3-C78F87581A17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "matchCriteriaId": "4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "matchCriteriaId": "85CA4444-5103-4451-8A7C-F6BBE714BBB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "matchCriteriaId": "FA1EB745-46D7-4088-93C6-E7156520B144", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "matchCriteriaId": "A93010C0-33B3-438F-94F6-8DA7A9D7B451", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "matchCriteriaId": "2A988A78-6B3D-4599-A85C-42B4A294D86D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "matchCriteriaId": "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "matchCriteriaId": "246AA1B0-B6C8-406B-817D-26113DC63858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "matchCriteriaId": "00EE5B42-FF05-447C-BACC-0E650E773E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "matchCriteriaId": "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "matchCriteriaId": "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "matchCriteriaId": "5D616C72-0863-478C-9E87-3963C83B87E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "matchCriteriaId": "CC333B0D-3A0E-4629-8016-68C060343874", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "matchCriteriaId": "6655535C-FF64-4F9E-8168-253AABCC4F5D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "matchCriteriaId": "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "matchCriteriaId": "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "matchCriteriaId": "1EACEF19-83BC-4579-9274-BE367F914432", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "matchCriteriaId": "24128A7F-2B0B-4923-BA9E-9F5093D29423", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "matchCriteriaId": "0990DD71-9E83-499D-9DAF-A466CF896CFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "matchCriteriaId": "9B7FEDEF-9772-4FB1-9261-020487A795AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "matchCriteriaId": "FE7B0F72-DEDF-40C4-887C-83725C52C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "matchCriteriaId": "9568C222-9816-4520-B01C-C1DC2A79002D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "matchCriteriaId": "53A1F23D-7226-4479-B51F-36376CC80B04", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*", "matchCriteriaId": "BAB245C8-9918-41A0-9DFB-A11E4185C87A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*", "matchCriteriaId": "9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*", "matchCriteriaId": "F752A3C8-18ED-4765-B6EC-C664154EB701", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*", "matchCriteriaId": "B4F31C3F-7C0D-4D95-B4B9-89FD38076913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*", "matchCriteriaId": "5BEEE36E-E735-4A33-80B7-9407D072F6BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*", "matchCriteriaId": "2CB3D3DE-21BE-40C7-A510-AC97C92390DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*", "matchCriteriaId": "0D9A9545-38A3-460D-AB1A-8B03BEB405A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*", "matchCriteriaId": "1860D932-777D-41F2-94A2-D14AB1494AA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*", "matchCriteriaId": "75165A10-2FD5-4370-814C-B60FDE339AFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*", "matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "matchCriteriaId": "65AAC7A7-77CA-4C6C-BD96-92A253512F09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "matchCriteriaId": "FCD16C07-0050-495A-8722-7AC46F5920F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "matchCriteriaId": "01423706-C82C-4457-9638-1A2380DE3826", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "matchCriteriaId": "A881E2D3-A668-465F-862B-F8C145BD5E8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "matchCriteriaId": "3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "matchCriteriaId": "4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "matchCriteriaId": "6602DD69-E59A-417D-B19F-CA16B01E652C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "matchCriteriaId": "05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "matchCriteriaId": "40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "matchCriteriaId": "ED96AC16-12CC-43F6-ACC8-009A06CDD8F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "matchCriteriaId": "2CE9DC29-C192-4553-AF29-D39290976F47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "matchCriteriaId": "F625E647-B47E-404C-9C5B-72F3EB1C46F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "matchCriteriaId": "E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "matchCriteriaId": "B5878612-9825-4737-85A5-8227BA97CBA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "matchCriteriaId": "F453D348-28CE-402B-9D40-A29436A24ECC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "matchCriteriaId": "36322F4B-83D7-468A-BB34-1C03729E9BF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "matchCriteriaId": "0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "matchCriteriaId": "A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2A50E-94FA-44E9-A45D-3016750CFBDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "matchCriteriaId": "5625CAD8-4A62-4747-B6D9-90E56F09B731", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "matchCriteriaId": "43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "matchCriteriaId": "78DE1A01-3AEF-41E6-97EE-CB93429C4A1D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "matchCriteriaId": "410184AF-B932-4AC9-984F-73FD58BB4CF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "matchCriteriaId": "B265F073-9E0A-4CA0-8296-AB52DEB1C323", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "matchCriteriaId": "3F664223-1CBC-4D8A-921B-F03AACA6672B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "matchCriteriaId": "987A8470-08BA-45DE-8EC0-CD2B4451EECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "matchCriteriaId": "8BBC9542-FB77-4769-BF67-D42829703920", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "matchCriteriaId": "74FDC18B-4662-422E-A86A-48FE821C056F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "matchCriteriaId": "CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "matchCriteriaId": "CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*", "matchCriteriaId": "78E4461B-72F8-4F3D-A405-4AFA99EC8A32", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*", "matchCriteriaId": "663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*", "matchCriteriaId": "DAEDED56-9387-4DAC-BF52-C32ECCB7D407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*", "matchCriteriaId": "FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*", "matchCriteriaId": "E57A9B28-734B-401D-B24C-A295F364D8E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*", "matchCriteriaId": "F02289DF-4A02-4602-89B7-E9148236EE1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "matchCriteriaId": "723E7155-493D-4B5A-99E2-AB261838190E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "matchCriteriaId": "82E37264-E4BA-4D9D-92E7-56DE6B5F918F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "matchCriteriaId": "8704BE6D-2857-4328-9298-E0273376F2CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*", "matchCriteriaId": "731F1E65-1D53-443B-8E2F-8AF11191AFA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*", "matchCriteriaId": "02A83822-822D-4A4D-B29B-A5BE6367A7DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*", "matchCriteriaId": "E8C32738-F08E-469C-8DE0-2708F30574A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*", "matchCriteriaId": "B292187E-8EAD-49D2-B469-B14CA0656035", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*", "matchCriteriaId": "C7D131E1-24C1-48CF-B3DD-46B09A718FB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*", "matchCriteriaId": "0ABF1231-73CF-4D1B-860C-E76CD26A645E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*", "matchCriteriaId": "F7F88E38-4EC4-41DB-A59D-800997440C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*", "matchCriteriaId": "32FD6647-4101-4B36-9A9A-F70C29997148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*", "matchCriteriaId": "D248D668-A895-43B3-ADEF-1B22EE7DC76E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*", "matchCriteriaId": "858411B5-E904-45FA-8B33-5CC73B915B22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*", "matchCriteriaId": "6BB9336C-C893-4AB0-9402-868CE9960058", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*", "matchCriteriaId": "A4695F94-7AAE-4219-9EF6-CE6D0838192D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*", "matchCriteriaId": "BD7A0991-73F0-410D-855C-BFC88A66E61F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*", "matchCriteriaId": "FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*", "matchCriteriaId": "9858EAC3-C1CE-449B-A605-FFA337DA825D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*", "matchCriteriaId": "E7A8F905-A4C6-4EC6-B9E8-800948350B89", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*", "matchCriteriaId": "565B48E3-1406-4E3C-B4A5-35865C5614E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*", "matchCriteriaId": "46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*", "matchCriteriaId": "8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*", "matchCriteriaId": "191A094B-E354-4767-AD43-87CE140BF851", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "matchCriteriaId": "C1289B9E-5725-42EF-8848-F545421A29E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*", "matchCriteriaId": "238A21CB-F8C5-468B-B523-6D014E2EA8AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*", "matchCriteriaId": "0DC52CDD-614D-4EA0-8DA8-D71189C42E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*", "matchCriteriaId": "A3A630E1-6CAE-4809-AB18-5002F158AE90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*", "matchCriteriaId": "A67750FF-EF4B-414F-8ED4-299CAF33B0DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*", "matchCriteriaId": "5A82D885-82F5-4755-BC11-5899E28CEE42", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "matchCriteriaId": "88AF1366-8A14-4741-8146-886C31D8D347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*", "matchCriteriaId": "7FD75301-E29C-47DC-B53F-DC44EA0C1885", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*", "matchCriteriaId": "8C944024-BEAA-43AF-A339-FD69C75E8240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*", "matchCriteriaId": "435C69D1-3932-4379-8D18-B1E12D558325", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*", "matchCriteriaId": "3572B700-73C0-41D1-95FD-FE9D5B0C1F80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*", "matchCriteriaId": "97A40DC9-0D4E-4C91-8D1B-3CED95B3952E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*", "matchCriteriaId": "16FB3E4B-05F8-411A-8C86-4ACE03815553", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*", "matchCriteriaId": "8E55EBC1-6F96-47CD-9503-7855EFB07240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*", "matchCriteriaId": "4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*", "matchCriteriaId": "F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*", "matchCriteriaId": "A1789924-FADB-4076-8874-120B29EE6B86", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*", "matchCriteriaId": "BC246667-2F6F-4024-9EAA-2CE3018235C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*", "matchCriteriaId": "B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*", "matchCriteriaId": "1341A5D4-A5CE-4D31-A178-01C3069D7A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*", "matchCriteriaId": "86A5C199-92E5-435C-AC40-175849285104", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*", "matchCriteriaId": "67589F54-0A54-4DE7-9A47-A73DD05F7965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*", "matchCriteriaId": "DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*", "matchCriteriaId": "8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*", "matchCriteriaId": "92C5DC8C-3318-440B-8B29-4827F343927B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*", "matchCriteriaId": "0ECC47D8-F602-4CEA-B19A-209CE76C9D36", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*", "matchCriteriaId": "7514ADD3-DECC-4CC2-9421-A609E526FDC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*", "matchCriteriaId": "691097C3-F91B-499B-BAEB-4E7E9C43B517", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*", "matchCriteriaId": "0B3DB1ED-017B-43EF-92A3-A8A88669FBC2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*", "matchCriteriaId": "19A49AAF-0F08-4151-8F74-4EF9C3415B00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "3F7A2018-BB4D-4DC1-813D-A4AA3F270893", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*", "matchCriteriaId": "A95D91C4-C539-4458-A6C9-8AE17207AE30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*", "matchCriteriaId": "37F9D218-8198-42C7-88FE-7C5382138324", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*", "matchCriteriaId": "CF8FDD81-95EE-4241-93C8-925085A4CE7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*", "matchCriteriaId": "614D9E35-10E0-4CCB-B817-C7C8C3947BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*", "matchCriteriaId": "F75F987E-F4DB-46FF-B048-21B4A4C07B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*", "matchCriteriaId": "05376F2C-30B6-406D-90F7-6C2E00E85171", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*", "matchCriteriaId": "CCDD3DF6-24BF-4C13-8F07-AF07327E5622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*", "matchCriteriaId": "B1520A64-2157-45D7-A135-F900798C4EB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*", "matchCriteriaId": "05A30F85-5367-4369-B7A5-176D71279FC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*", "matchCriteriaId": "B8803FF9-48D7-4AB0-8A17-4590CABD0BFD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*", "matchCriteriaId": "1DC63B6B-5D6D-477B-9125-007F835981B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*", "matchCriteriaId": "BF385AC9-963E-4670-95A6-BE1EBC3890B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*", "matchCriteriaId": "943FA088-2902-45A9-A1BA-D612B46A50D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*", "matchCriteriaId": "8C80902D-9A6C-47D4-B56F-35C378FC0E63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*", "matchCriteriaId": "1100B46C-8485-4048-BFF8-2BAB311EC04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*", "matchCriteriaId": "4B9E1646-E154-41BA-B9FA-0839A898023D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*", "matchCriteriaId": "03F4C8E6-0043-41A8-94EA-EEBAA1A081E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*", "matchCriteriaId": "31C10985-CBF7-4717-A7D6-2594887D7CB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*", "matchCriteriaId": "8C49886C-B6A0-4D95-8533-329FE5A66F6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*", "matchCriteriaId": "0788CF23-3FAF-44C9-9AAA-96E4818A1AEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*", "matchCriteriaId": "24AF7001-64D1-4BFB-9280-0BA0FAD97A0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*", "matchCriteriaId": "8C6E420E-16DA-4FB1-9968-C93E229614FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*", "matchCriteriaId": "07469E04-B3D2-41FE-A2E4-E25A977026CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*", "matchCriteriaId": "60FF402E-5E4F-414A-A3AB-149548303616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*", "matchCriteriaId": "79E2B875-A270-45C0-A1B1-041264E5B290", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*", "matchCriteriaId": "8C828C8C-7ECB-4167-87A9-0F522C400C66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*", "matchCriteriaId": "0C2C887F-1EF7-468A-A6AE-440793C78DAC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*", "matchCriteriaId": "6F2F3D7F-D884-4ACD-A103-060F57A9867B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*", "matchCriteriaId": "BD1FCAAD-7072-45EC-9ACB-08556458BAF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*", "matchCriteriaId": "C4446224-40E8-4AD0-8197-921D3473E19B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*", "matchCriteriaId": "4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*", "matchCriteriaId": "B92B68FD-771A-4401-8B1D-B1A252356F62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*", "matchCriteriaId": "1B933941-0BE3-4EEB-8FDD-2DAA63343EE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*", "matchCriteriaId": "8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*", "matchCriteriaId": "36F737C1-6011-42D2-9690-CA81EA0A283C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*", "matchCriteriaId": "19CA7EB6-D1C9-48D9-A69A-2618800A6CE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*", "matchCriteriaId": "0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*", "matchCriteriaId": "ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*", "matchCriteriaId": "56C909B0-8FB2-4220-AF93-EECB8D650CC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*", "matchCriteriaId": "FF36BAD0-A762-4F84-BE0B-060FE666ED67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*", "matchCriteriaId": "007337CD-94FB-4ED9-B4A3-9E0EC52D79B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*", "matchCriteriaId": "BCDFA137-F1FC-46BD-9872-D62671B1434D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*", "matchCriteriaId": "2E6DBCB3-E912-43A1-914B-5C7CCFAADE25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*", "matchCriteriaId": "0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*", "matchCriteriaId": "E2C67312-E128-4833-A91E-D7A9F96A7AD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*", "matchCriteriaId": "3F19F408-FABD-4A68-8CDC-C763F0321FB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*", "matchCriteriaId": "68A06EC2-E491-4CD5-9904-61A88EBB7FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*", "matchCriteriaId": "789A8CAE-8D9E-4244-880D-FBE28EC53AED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*", "matchCriteriaId": "F901EE11-D0C9-46F6-8316-D8F4F1D50260", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*", "matchCriteriaId": "E549F600-B9CE-4843-A772-2DACC528903E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*", "matchCriteriaId": "3F28E733-87ED-4610-A8EE-BD37BED7685B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2832E8BF-7AC7-444C-B297-66F770860571", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "44AA72FB-E78D-419E-AA82-B0538C6504D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "687C3BF3-D71A-49AD-8A05-EAC07CBCD949", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "90AF90D9-16C4-4F8A-9868-3E2823E3445C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "3C063C53-8970-45B1-85F8-FB2080BF4695", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "64596ED7-794A-4D23-987B-D9AD59D48EA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "A561A8E8-79E2-4071-B57D-590C22EF86A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "92E46658-60AB-4758-9236-3AC0E6464383", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "matchCriteriaId": "207B8FBA-E2FF-485A-9AD9-E604AE0FB903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "33F99640-C753-40BE-A0A1-4C2D92E7DB09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F98247B-1839-4676-855B-827A4B6C016B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDBA35BD-1048-4B6E-96B2-1CFF615EB49A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6CEEEE2-D6A2-4342-8A73-934093948824", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "979FEE9F-A957-43B6-BB6D-1A851D6FA11C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AF59D-D05E-47F9-B493-B5CD6781FDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF7EC93-0170-45A9-86C7-5460320B2AE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5F803AC-DCC7-43FC-BEB3-AA7984E0506C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "560993AA-299D-42B7-B77F-1BD0D2114CCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C582B1C-1DAC-48FD-82DD-7334C10A2175", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7862B0C-2C44-4110-A62A-083116129612", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "048C5996-F719-4338-B148-0DD1C13E02FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF7FB-AB5A-4549-8C15-E69458C649E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CEF6608-B650-4C77-9823-0AD57B3484F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BE6A2D7-901C-45F9-B487-D674047D522E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ADCB509-5B0E-4592-8B23-EC25A3F79D41", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB51691F-089F-4016-B25E-238074B06C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA37503-FD3D-4220-933C-234631D6EDEF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "matchCriteriaId": "72992831-2A76-456B-A80C-944BDD8591E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79C2131-5566-4CC2-B6ED-38E3F6964500", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "matchCriteriaId": "60BFDAA6-3DFC-4908-BC33-B05BAB462F94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6266056-770A-4E2D-A4FC-F1475257648E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "929AA8F3-8BDF-4614-9806-6D4231735616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "605D7552-8184-4B11-96FD-FE501A6C97DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3144BBDE-CC96-4408-AA02-ECC3BF902A34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B8BA77A-34E3-4B9E-822A-7B7A90D35790", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7165B43-ED22-4714-8FA4-1E201D1BFA69", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CFB133-FAF0-431A-9765-8A9738D6D87C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "matchCriteriaId": "2975B0F2-DB7C-4257-985A-482ED2725883", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "70221E07-3C2E-4A82-8259-AD583EB5CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "427DFD78-56CD-43C4-948E-F53AF9D669F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AD7649-3FEA-4971-9886-6C9312B937A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4EE972C-6BAE-4342-BA01-1D685487F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDFE3B-C064-49A9-BD43-3F7612257A74", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BD0EEC1-D695-41A5-8CD6-9E987A547CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF25B8-D474-4C6B-8E45-F57DDC7074E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DF18FD1-6670-4C3C-8000-A079C69D575E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "921EB5A5-F911-4FCE-A6F1-C66818B34678", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "023063E1-2DD7-487C-A8A7-939FAEE666A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "77255CE6-D7B7-4B48-993C-7100A1170BC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40AC368-3A14-4EFF-A8D0-7EFB4C83045D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C07E80D5-70A5-49C9-9044-D683C7ECCFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "63668AF4-F29C-4424-8EC5-2F0A5950DD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86616FE-0C3F-4984-A364-8A6A9F01DAD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C1C7CD-538D-4D7A-A81C-10DF5376A479", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5922F749-2B23-44B8-8A46-F31BCAEAD279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D75D0EEB-707C-4C86-A569-E91E9F00BA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FB0E20-0243-40A1-8DEF-37150791222E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "68CFF26D-8AD3-4179-9E4C-F06D7C858C9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7541572C-229F-4963-B7F0-06EB3323E53B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "matchCriteriaId": "85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "479F7C77-D16F-4E40-9026-3EB8422E0401", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DB08C8-0018-4A8E-A206-097BDDF83B08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7193E85-30BE-42D5-A26B-3F88817F3574", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "446E8515-45FC-4B8B-8D12-60643D64C07F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDF6B2-D388-4639-87D8-064AA3F6B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "00AAB8B6-B614-4EAA-BA90-C5326CB5D07A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A371DF9-E224-404F-99C2-C2A4607E62D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F40E356-365D-44B7-8C38-A0C89DDD6D3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3132029-89F8-4359-A0DC-A275785266A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02F5685-0636-48AB-B222-434CA1F3B336", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ED4693C-DECF-4434-90C0-56158F102E7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB408A6B-0842-43DA-9180-B0A299FCBCE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6215EBAC-7C75-4647-9970-482120897F1F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D1FD6E8-80EC-461F-9ED1-CE5912399E80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E96F585E-BDEF-45EE-B0AB-94FE23753AC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3279C067-3058-4D46-A739-05404FD0E9B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "matchCriteriaId": "DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C0855225-F501-486A-BD03-2A86FD252B5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "matchCriteriaId": "214C7B0C-C438-4000-9F9B-6D83294243AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4C91AA2E-4BB2-49C8-9364-4E363DF42CB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DA26781F-5A1C-4DA5-835E-D984D697F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA4222-F25D-4457-80AA-6D05CA918D68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "matchCriteriaId": "9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "6777AC35-9D1F-4153-94AC-B25627D730E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "matchCriteriaId": "A5F063F4-8994-4E46-BA7B-A12A112009BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "matchCriteriaId": "4D6F2DE5-AF11-439A-8D37-30CB882ECD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E213DD86-5419-42C8-BF38-7795DDB3C582", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A972291E-5231-439D-873B-2F87BCAF800A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C089CC54-3229-43D7-AA15-73CFA1A43EE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "matchCriteriaId": "EF268D83-C15D-4559-A46F-844E1D9264F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CFE97C0D-3EA1-4314-A74A-7845C7778FB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "matchCriteriaId": "34293F29-F327-4ADD-BF62-78F63F79BB96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "matchCriteriaId": "528C0A46-1CC4-4882-985A-0BB41525BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "matchCriteriaId": "643F3522-A452-4927-944D-532574EC4243", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "matchCriteriaId": "58F40B78-4DBA-44EE-8420-086789EFF53D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "matchCriteriaId": "423BFD8F-4B50-43DA-9979-75FD18FBC953", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8BAD4A68-0481-476F-BBBD-3D515331368C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "matchCriteriaId": "838CEB7C-7C4C-416C-86CE-6E8DD47EF25B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "matchCriteriaId": "CC7D021F-3C97-45B3-B1F7-0AC26959F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4A31AEF3-448D-417B-9589-4BA0A06F2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F7A1D96F-7FFD-413F-ABCE-4530C3D63040", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "matchCriteriaId": "4B8343FE-1320-40AE-A37F-70EF1A4AC4B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD42BA5A-7DA0-409D-8685-E43CF9B61D9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A5FF80E9-CF28-4EF6-9CFE-4B500A434674", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "matchCriteriaId": "647B77A4-2F49-4989-AF43-961D69037370", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "matchCriteriaId": "805B1E33-F279-4303-9DF3-C81039A40C1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "matchCriteriaId": "B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7E0AAE-6539-4024-9055-BE0BAD702143", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7F1A8828-0765-4799-AD6C-143F45FAAD23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "matchCriteriaId": "12D34618-1CCA-405B-A49C-EB384A09C2C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "575D6061-66BC-4862-BC84-ECD82D436E2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "matchCriteriaId": "56B6EE64-1AD4-46B2-BA65-BB6282E56EB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "matchCriteriaId": "11650B45-0BDA-42BF-AEF3-83B48DD6A71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "matchCriteriaId": "BD3C92BA-827B-48AF-BBB3-FB60A9053C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "matchCriteriaId": "AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5EB44CA7-DFE6-4B1A-9A63-97AE30017E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4B305EFA-6226-412C-90EE-F0691F2DDDE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "matchCriteriaId": "7F3874FA-63CB-4B5D-8B64-CE920320A4E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "matchCriteriaId": "0800ED17-50E4-43F3-B46C-591DFA818BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "matchCriteriaId": "A46B0405-F301-4209-8766-6E12EAFAD157", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F99F9F1F-A967-4884-96CF-4488102DC0A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "matchCriteriaId": "DA9B37AD-4599-425B-B39F-E571F4975266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C5A5F1CF-A1E6-45F1-8B09-36566778DB57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "matchCriteriaId": "698C8A49-888B-4675-B3B0-25EDE2FD515E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "matchCriteriaId": "70D98F97-8EF4-48B5-84BE-C3CC27031FDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "matchCriteriaId": "B473D1FA-909B-492E-9C5B-94B0E20E1C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "matchCriteriaId": "BFD5EA7E-322E-4CE6-89D4-7DB1055C9034", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "matchCriteriaId": "67836379-4E1A-45CD-9506-7D3F612E47C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "matchCriteriaId": "5B1BBC61-8664-4452-93A7-DDB4D2E4C802", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "044F0375-DF2F-4D9B-AD7E-473D34165E8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "matchCriteriaId": "2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4A0655CA-A88C-4632-9A18-560E3F63B2F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "matchCriteriaId": "8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C6965851-3B29-4C21-9556-97FD731EAA85", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "matchCriteriaId": "52984FD2-44E0-4E91-B290-0376737EEF6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DF933366-7503-4F8D-B7AA-F6A16210EC37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4E2DAF5D-5BB7-49C6-8426-8B547505B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3EABB21D-D021-434B-B147-CAF687097A5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "matchCriteriaId": "7609424D-95F1-4493-A20C-B1BA4EC6439D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "matchCriteriaId": "966DC636-C802-4D9F-8162-652AFB931203", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A75794EB-A5AF-43F0-985F-D9E36F04C6D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "matchCriteriaId": "31C2CFF0-98FD-4A0D-8949-D554B2FE53D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "matchCriteriaId": "05F9217F-5028-4659-AA8E-F60548DE4D52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4AC769DC-CF2E-4A3C-A610-264F024E6279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "matchCriteriaId": "9B2B1CBF-D155-49BC-81A4-4172F177A5C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "370B2B32-519E-4373-8A04-5C5025D688BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "83D9B562-C279-4A55-A347-F28FC4F9CD12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "2A8C2BA0-48A8-4107-8681-A7C34C553D8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "B1B009DE-A82F-4569-9B42-EC1EC4DA8A40", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "683B6E83-37FF-4F9B-915F-059EBB29DB53", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E218718F-4BE6-48B0-A204-9DD4A932A654", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FB0AB327-B60A-473C-9D36-97766EE62D7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA249EE-4786-4E27-8787-5E8B88C2AEB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBD0529-1CF3-44E5-85B3-19A3323C9493", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D664EE97-07EC-410F-94C3-AEAB2C6A627D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "D31DB981-03B1-4A84-8D87-CD407C3C149F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CBD155D-89D9-4677-A621-4D7613BE65C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02BD0D4-FFFD-4355-97D8-170362F10B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6635781A-2651-4EF2-A5AC-AEEEE63FDE6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DCE6930-760A-48C0-B964-1E3ED6A8517C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E52DE90-DF96-4CE7-B8D1-226BA50E4D09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8EB40E7-9B91-4106-B303-2B70AF395BFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB0D5CD-8AF3-409D-96A7-718641D4B90D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E420B0B-0CD5-41C7-B25A-3DB856055F9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B0C295B-0D63-4BE7-830D-D927E00C301C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "matchCriteriaId": "605C340D-2220-4669-B827-9009CB099E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8791879D-2908-4F57-8DB3-6D24100A9108", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E823DC5B-98BE-4656-BFBF-3A7018F8F213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E8D558-ADE0-4358-9C76-7BD77BF23AA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7973B3D0-F244-4E26-88F5-A2D9BF2E4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "matchCriteriaId": "68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5CB567-4F86-4466-BE4D-BFF557ACAE0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A52611B-6583-4660-90D7-C9472728072B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E80C6E89-B57C-47BB-8B95-50C03DFB3B96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9AB685B-FEE1-41EF-A046-1B34619E12A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB9F6724-967A-4AF0-9896-12BF6164B2CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC1116BF-12D7-47CC-98DB-18B200CF9C16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FBB28DE-726B-4AF0-88A5-35987E1E648B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1880E2B8-5E0E-4603-8D17-3ABA43D28179", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FAFBB92-1917-4238-832B-195FBE418271", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "91DFDF3F-9A3F-42B8-99A1-A3F76B198358", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "matchCriteriaId": "8778F972-BF34-482F-9FA7-71A77F6138E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F288BB0-FE7A-4900-B227-BE80E4F4AADF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E16338-A094-4CA9-B77F-6FE42D3B422C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E07AB33-5351-487D-9602-495489C7C0B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "matchCriteriaId": "22115ED6-1707-4840-B0D1-AD36BC0C75A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C633BC-831F-4CB7-9D62-16693444B216", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD501E1-E78F-44C6-8A13-C29337B07EBE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "matchCriteriaId": "9085BA0B-B7E2-4908-90C0-B4183891C718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "matchCriteriaId": "81971C2F-137A-4F11-8C93-3B99D4CD1B58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E0BDAC-398E-406B-B2DB-AE049D6E98B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFDE6C-DE58-4C4D-882E-474EF6C3D934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "matchCriteriaId": "950C6BF9-AA47-4287-AC01-D183237490FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2355181D-D8EE-4F80-8280-13D5CBCF4779", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5209343F-66B0-4DC0-9111-E2E64CFF7409", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "720109A6-B79E-48E1-9AE7-7708B154788E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "82FF0DBD-AE13-4232-80F7-F4C2E2CC9721", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E944ED-8C02-46B8-BF95-0CE4C352753B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "matchCriteriaId": "77AEA3D1-4846-46E2-9B80-20B19F00DC11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1576978F-E93D-4A47-90B6-6A4E3A7DE558", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D339FE5-001F-4005-88A5-CFFE37F9B63E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BDABA86-497E-497E-A5BA-46F913A4840A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD886F4C-DB6F-4DDD-9807-8BCBB625C226", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4C454B7-E5F4-4AAE-B577-FD71FA002C8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "38BE2781-3A06-4D62-AC8B-68B721DA526B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DA23772-2EB8-4BEE-8703-26D967EC4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "72DC766A-B1F9-4B83-9F9B-CF603EE476BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA594740-43C5-4F42-BA5B-00CA8AE7BB60", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "572B16E2-8118-43A0-9A80-5D96831D55FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB5C551-BADC-4A3A-93E5-2EBCA0704C51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5383B7A3-1569-4FEB-B299-B87CE8C8A87B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A05BBDE0-6C47-4489-9455-7DA7D230ECA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "matchCriteriaId": "1789AA69-EA31-44D1-82E6-228E48E18586", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A7D5FF-3B1F-4C64-BB81-7A349765520D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F0498B3-393A-4C32-B338-E6014B956755", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C451F752-6869-4AFA-BAE5-5C9A54427BF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "83710FD1-099B-436D-9640-061D515E10BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "517B71CE-6156-40E1-B068-A2B733E205E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "11DEEEE5-5055-4CE1-962C-C5F075F4CC02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "matchCriteriaId": "8718DDAB-3208-48CF-9BCE-54DA1257C16A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1AA901-E822-4240-9D82-C9311E4F87B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1CDE3DF-8E79-4997-94EB-B517FFCAE55C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "12A0DE13-EB0B-493B-BC84-3AEB3D454776", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "matchCriteriaId": "1727697B-1F59-4E29-B036-C32E9076C523", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E69E827C-C0D0-46C7-913A-1C1E02CEAACE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2528F3F9-34DC-41DA-8926-382CB3EF5560", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E452C262-5A8D-4D97-BC7F-A4F5FF53A659", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D57BF69-D750-4278-98AA-976B0D28E347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "76ADAE30-6CAD-4F5B-B6F7-C18953144C63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A25D792-E21D-43EE-8B9D-67DE066DE5DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C669783-C058-4B4F-BB9A-84B2C4682247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "matchCriteriaId": "159B088B-9A85-4CAA-854A-AA080E528F95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBE74A94-FE8F-4749-A35A-AB7D57E24913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "990AC341-0E67-4A81-87E9-EE3EFD9E847E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BC18B0-58F1-4477-9978-CA7383C197FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "matchCriteriaId": "474992FB-842D-4661-A565-44AF2CD78693", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "476E1B79-5342-4895-96D7-E97DFC1F5334", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD318D5-89A6-4E28-939C-C5B61396806B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32C7E89-32ED-4328-9313-FA7D3DDBDC58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2792EED8-2CBD-478E-BC09-05FE830B3147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B1AF2F-6E48-4DBD-A60E-3088CA4C3771", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "matchCriteriaId": "34E1691D-65B3-45E4-A544-8B29E38D569D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "matchCriteriaId": "E42F2703-B8AB-410E-AF7B-CD0BE777F061", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "matchCriteriaId": "31244C94-00A3-499C-A91A-1BEF2FB0E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "matchCriteriaId": "878FF6E8-8A6D-44CE-9DD1-2C912AB8A193", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5078A95B-2BD8-4A37-A356-F53D1A53CB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "matchCriteriaId": "0BFE67CD-DE53-4C4E-8245-35902AEFA6E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "matchCriteriaId": "9F231D31-3AAD-4C5D-A225-D2DF94486718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5998DF5D-E785-45EC-B8D0-1F4EC4F96D50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "EADFD013-0BFB-427C-98E6-F9E4774DCBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "58620B10-FEA6-456D-B6B5-2745F5DBE82D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "matchCriteriaId": "E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4858A1F0-97F2-4258-AB98-027BF1EC5117", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3C961A8B-EAFD-4F66-9432-BCC0D154ECCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "matchCriteriaId": "052DE6CD-A1E7-4E81-B476-66EF451061C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "matchCriteriaId": "3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "matchCriteriaId": "751B3AC8-D45E-46B6-83D5-311B693F3C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "matchCriteriaId": "9588277A-0B97-4408-9CF7-11271CDAADD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "matchCriteriaId": "479FE854-85E5-4ED0-BFAF-2618C9053082", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "matchCriteriaId": "E048B9BF-77C8-49F7-9F2D-9999F79BA264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "matchCriteriaId": "6CD16D4D-E816-486D-96F4-5A2BF75B959F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "matchCriteriaId": "169C558E-1A83-47D5-A66B-035BD1DD56FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "matchCriteriaId": "D683E509-3FB2-4175-BCAB-4EB1B5C04958", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "matchCriteriaId": "6FCFA915-5445-4732-9F8F-D7561BA4177F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "63A9FD98-C22D-48F6-87A1-60791C818A1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "matchCriteriaId": "85F99F24-1783-4E6E-BE61-04C2E80356ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "matchCriteriaId": "74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "matchCriteriaId": "85289E4C-C813-4677-867D-EE8E98F4A1A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "matchCriteriaId": "27C8150F-BEFA-406D-9F0D-E7CB187E26AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "matchCriteriaId": "1E807F90-819F-4103-B1F7-4CE46971BD63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD93203F-71B9-4F87-B5D8-FD273451C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "1E652C74-C48D-4F29-9E85-09325632443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "99158191-3013-4182-8A53-5DFCA1E2C60A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "matchCriteriaId": "F7E39A3E-7EAE-47C9-930B-58A980B73FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "matchCriteriaId": "FFDA54BA-C00D-4890-9B7F-328257607B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "matchCriteriaId": "1F5EFB1E-334C-4B55-8E2E-6AE19B34774D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "B8260DCA-2F0C-45F7-B35F-D489AF5639F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "matchCriteriaId": "7778F81B-6D05-4666-B1D4-53DB0EC16858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "matchCriteriaId": "5DC6706A-61F7-4AA0-B2FF-0FFDF739A644", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7EF1B16B-02F2-4ECA-938E-B5CDCFC67816", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3C5501D8-1B0D-4F5A-AFD7-C63181D3281F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "matchCriteriaId": "1751F0CE-A0D3-40E2-8EEC-D31141FE33A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5FF9AFA7-BBE8-4229-94CB-5A9596728BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "matchCriteriaId": "E23A777F-68A4-4217-A75A-4D8A27E6451A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "matchCriteriaId": "2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "392A4337-11F6-4980-A138-4FDBCAD0EBA4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E2E9BB67-F1FF-4190-889F-78B965CCE934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "matchCriteriaId": "F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "35607317-0928-4297-A33E-D44BEE1BBEC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "matchCriteriaId": "D48323B1-7FEB-451F-A064-23E7CE7F6403", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "matchCriteriaId": "29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F5763189-7980-4A72-92C9-1908FE9E15EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "matchCriteriaId": "C53ACD49-DA21-4DDE-A0AA-FCCD59D29886", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4326D350-EBC2-48E6-A2C6-0499F6826CEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8594E6FE-B6DB-4343-B3DD-AEC19923DAF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5BCADA00-E453-414D-9933-FCB43D21BBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E62212D9-F707-4A8E-AB2A-A3985E7A4049", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "matchCriteriaId": "561755A8-8AAD-4F41-8266-747EFDAF2D55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "matchCriteriaId": "E6F4BB0F-DAF4-479B-B78A-7929C151AA1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "matchCriteriaId": "A207312E-1D35-4464-A111-22C4C793E146", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E9B16E32-07D5-445B-BAA5-4E4A0881BFC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7CF08F6B-2ECB-414C-82D7-C06085BF8B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "matchCriteriaId": "21032BE3-74D8-4C3F-B461-158F475B6853", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*", "matchCriteriaId": "F6E468FE-73BE-4B20-B774-58EC7CD20CDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*", "matchCriteriaId": "0FF6B19B-7D45-44B3-8524-407253B93EEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*", "matchCriteriaId": "2B803FAD-E54D-49FE-A078-029B8FFBBB98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*", "matchCriteriaId": "CC511505-ED67-45B4-B76C-56AB750C4408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*", "matchCriteriaId": "A430C232-79EB-4264-AE24-41D4A2A5D990", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*", "matchCriteriaId": "3A9E3D4B-A3DF-4858-8C64-0316B6E57435", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*", "matchCriteriaId": "19108672-E1AA-41CC-B86C-061D3721C8B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*", "matchCriteriaId": "200D36CF-AEDE-4183-8C54-748E6E5A3218", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*", "matchCriteriaId": "4CF13A44-5163-4282-8EE8-7DC05499B5E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*", "matchCriteriaId": "827C12CE-D87D-489D-ABA7-BE0405EC33D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*", "matchCriteriaId": "16AA78F7-520B-4FFC-838C-DC74FEE8E13F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*", "matchCriteriaId": "A51E86F5-8F94-4E7C-9A63-DAA3FCBE0438", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*", "matchCriteriaId": "001AB619-157E-40B4-B86C-5DB18245D62F", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*", "matchCriteriaId": "1221FB4F-488A-4A52-8788-82ECBF92113B", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*", "matchCriteriaId": "38D51E27-28A3-47A1-9C36-1A223858E352", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*", "matchCriteriaId": "365DF3EF-E7D1-41FC-8382-D3B095542D59", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*", "matchCriteriaId": "D0B2B122-34A9-4534-A996-8FEAACA71A05", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*", "matchCriteriaId": "C850453B-CDB1-490D-B551-9AC0B27D8A67", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "matchCriteriaId": "588D4F37-0A56-47A4-B710-4D5F3D214FB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:-:*:*:*:*:*:*", "matchCriteriaId": "7151A19C-0AE5-4F66-9E3D-8BF675A8430C", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:sp1:*:*:*:*:*:*", "matchCriteriaId": "BEEB72F4-AE57-49DD-8876-1BCA7B805692", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "7929F123-AC76-4F49-940F-558CABC25E75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6034789-ABD1-4035-8378-F0BA7157B087", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9317C01-22AA-452B-BBBF-5FAFFFB8BEA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4534CF9-D9FD-4936-9D8C-077387028A05", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "D60384BD-284C-4A68-9EEF-0FAFDF0C21F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "CDA8DD5B-8A34-4CB3-B0FB-F82C73B25007", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "matchCriteriaId": "C403C49F-3779-4A7A-8D12-B4A32BFD77CF", "versionEndExcluding": "5.1.32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AEC1DE4-F01C-4D21-8FB6-A0D4460D6CD0", "versionEndExcluding": "5.2.6", "versionStartIncluding": "5.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." }, { "lang": "es", "value": "Los sistemas con microprocesadores con ejecuci\u00f3n especulativa y predicci\u00f3n indirecta de ramas podr\u00edan permitir la revelaci\u00f3n no autorizada de informaci\u00f3n al atacante con acceso de usuario local mediante un an\u00e1lisis de un canal lateral." } ], "id": "CVE-2017-5715", "lastModified": "2025-05-06T15:15:51.640", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "[email protected]", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2018-01-04T13:29:00.227", "references": [ { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "source": "[email protected]", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102376" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040071" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html" }, { "source": "[email protected]", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html" }, { "source": "[email protected]", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "source": "[email protected]", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "source": "[email protected]", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Nov/16" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2017-5715" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://spectreattack.com/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX231399" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3531-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3531-3/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3560-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3561-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3581-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3581-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3582-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3582-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3594-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3620-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3690-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3777-3/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4120" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4213" }, { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Nov/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2017-5715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://spectreattack.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX231399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3531-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3531-3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3560-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3561-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3581-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3581-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3582-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3582-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3594-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3620-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3690-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3777-3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "[email protected]", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF71B61-A595-476B-B949-1A0FBDB360A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis." }, { "lang": "es", "value": "Los sistemas con microprocesadores que emplean la ejecuci\u00f3n especulativa y traducciones de direcciones podr\u00eda permitir la divulgaci\u00f3n no autorizada de informaci\u00f3n que reside en la cach\u00e9 de datos L1 a un atacante con acceso de usuario local con privilegios de invitado del sistema operativo mediante un error de p\u00e1gina del terminal y un an\u00e1lisis de canal lateral." } ], "id": "CVE-2018-3646", "lastModified": "2024-11-21T04:05:50.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "[email protected]", "type": "Primary" } ] }, "published": "2018-08-14T19:29:00.920", "references": [ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105080" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041451" }, { "source": "[email protected]", "url": "http://www.securitytracker.com/id/1042004" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "source": "[email protected]", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "source": "[email protected]", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "source": "[email protected]", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "source": "[email protected]", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "[email protected]", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://foreshadowattack.eu/" }, { "source": "[email protected]", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "[email protected]", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "source": "[email protected]", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "source": "[email protected]", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "source": "[email protected]", "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "source": "[email protected]", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K31300402" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3741-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3756-1/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3823-1/" }, { "source": "[email protected]", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "source": "[email protected]", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "source": "[email protected]", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "source": "[email protected]", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "[email protected]", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "[email protected]", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1042004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://foreshadowattack.eu/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K31300402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3741-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3756-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3823-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "matchCriteriaId": "CD028C10-FD07-4206-A732-CCAC1B6D043D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "matchCriteriaId": "704FAA50-1B7D-4917-AC4A-4C58785340F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "matchCriteriaId": "5C6B95D3-75BD-4826-BFBE-9701CC0FF052", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "matchCriteriaId": "F66E31A6-EA01-40C8-8718-CE2C1F45EEB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "matchCriteriaId": "DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "matchCriteriaId": "022F2CBE-EFB1-4962-AC91-D25AAB057DAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "matchCriteriaId": "69C05CD9-551B-46EE-85F8-D18FF878FE8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "matchCriteriaId": "2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "matchCriteriaId": "3C38C609-242E-4923-A81F-DAFBE7B6A927", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "matchCriteriaId": "A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "matchCriteriaId": "8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "matchCriteriaId": "D7AC7C56-2205-4121-99E2-001A7488E0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "matchCriteriaId": "A1677313-FF8F-493B-9DA3-C78F87581A17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "matchCriteriaId": "4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "matchCriteriaId": "85CA4444-5103-4451-8A7C-F6BBE714BBB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "matchCriteriaId": "FA1EB745-46D7-4088-93C6-E7156520B144", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "matchCriteriaId": "A93010C0-33B3-438F-94F6-8DA7A9D7B451", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "matchCriteriaId": "2A988A78-6B3D-4599-A85C-42B4A294D86D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "matchCriteriaId": "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "matchCriteriaId": "246AA1B0-B6C8-406B-817D-26113DC63858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "matchCriteriaId": "00EE5B42-FF05-447C-BACC-0E650E773E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "matchCriteriaId": "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "matchCriteriaId": "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "matchCriteriaId": "5D616C72-0863-478C-9E87-3963C83B87E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "matchCriteriaId": "CC333B0D-3A0E-4629-8016-68C060343874", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "matchCriteriaId": "6655535C-FF64-4F9E-8168-253AABCC4F5D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "matchCriteriaId": "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "matchCriteriaId": "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "matchCriteriaId": "1EACEF19-83BC-4579-9274-BE367F914432", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "matchCriteriaId": "24128A7F-2B0B-4923-BA9E-9F5093D29423", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "matchCriteriaId": "0990DD71-9E83-499D-9DAF-A466CF896CFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "matchCriteriaId": "9B7FEDEF-9772-4FB1-9261-020487A795AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "matchCriteriaId": "FE7B0F72-DEDF-40C4-887C-83725C52C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "matchCriteriaId": "9568C222-9816-4520-B01C-C1DC2A79002D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "matchCriteriaId": "53A1F23D-7226-4479-B51F-36376CC80B04", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*", "matchCriteriaId": "BAB245C8-9918-41A0-9DFB-A11E4185C87A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*", "matchCriteriaId": "9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*", "matchCriteriaId": "F752A3C8-18ED-4765-B6EC-C664154EB701", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*", "matchCriteriaId": "B4F31C3F-7C0D-4D95-B4B9-89FD38076913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*", "matchCriteriaId": "5BEEE36E-E735-4A33-80B7-9407D072F6BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*", "matchCriteriaId": "2CB3D3DE-21BE-40C7-A510-AC97C92390DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*", "matchCriteriaId": "0D9A9545-38A3-460D-AB1A-8B03BEB405A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*", "matchCriteriaId": "1860D932-777D-41F2-94A2-D14AB1494AA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*", "matchCriteriaId": "75165A10-2FD5-4370-814C-B60FDE339AFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "matchCriteriaId": "65AAC7A7-77CA-4C6C-BD96-92A253512F09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "matchCriteriaId": "FCD16C07-0050-495A-8722-7AC46F5920F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "matchCriteriaId": "01423706-C82C-4457-9638-1A2380DE3826", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "matchCriteriaId": "A881E2D3-A668-465F-862B-F8C145BD5E8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "matchCriteriaId": "3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "matchCriteriaId": "4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "matchCriteriaId": "6602DD69-E59A-417D-B19F-CA16B01E652C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "matchCriteriaId": "05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "matchCriteriaId": "40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "matchCriteriaId": "ED96AC16-12CC-43F6-ACC8-009A06CDD8F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "matchCriteriaId": "2CE9DC29-C192-4553-AF29-D39290976F47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "matchCriteriaId": "F625E647-B47E-404C-9C5B-72F3EB1C46F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "matchCriteriaId": "E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "matchCriteriaId": "B5878612-9825-4737-85A5-8227BA97CBA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "matchCriteriaId": "F453D348-28CE-402B-9D40-A29436A24ECC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "matchCriteriaId": "36322F4B-83D7-468A-BB34-1C03729E9BF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "matchCriteriaId": "0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "matchCriteriaId": "A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2A50E-94FA-44E9-A45D-3016750CFBDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "matchCriteriaId": "5625CAD8-4A62-4747-B6D9-90E56F09B731", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "matchCriteriaId": "43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "matchCriteriaId": "78DE1A01-3AEF-41E6-97EE-CB93429C4A1D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "matchCriteriaId": "410184AF-B932-4AC9-984F-73FD58BB4CF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "matchCriteriaId": "B265F073-9E0A-4CA0-8296-AB52DEB1C323", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "matchCriteriaId": "3F664223-1CBC-4D8A-921B-F03AACA6672B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "matchCriteriaId": "987A8470-08BA-45DE-8EC0-CD2B4451EECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "matchCriteriaId": "8BBC9542-FB77-4769-BF67-D42829703920", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "matchCriteriaId": "74FDC18B-4662-422E-A86A-48FE821C056F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "matchCriteriaId": "CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "matchCriteriaId": "CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*", "matchCriteriaId": "78E4461B-72F8-4F3D-A405-4AFA99EC8A32", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*", "matchCriteriaId": "663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*", "matchCriteriaId": "DAEDED56-9387-4DAC-BF52-C32ECCB7D407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*", "matchCriteriaId": "FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*", "matchCriteriaId": "E57A9B28-734B-401D-B24C-A295F364D8E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*", "matchCriteriaId": "F02289DF-4A02-4602-89B7-E9148236EE1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "matchCriteriaId": "723E7155-493D-4B5A-99E2-AB261838190E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "matchCriteriaId": "82E37264-E4BA-4D9D-92E7-56DE6B5F918F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "matchCriteriaId": "8704BE6D-2857-4328-9298-E0273376F2CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*", "matchCriteriaId": "731F1E65-1D53-443B-8E2F-8AF11191AFA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*", "matchCriteriaId": "02A83822-822D-4A4D-B29B-A5BE6367A7DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*", "matchCriteriaId": "E8C32738-F08E-469C-8DE0-2708F30574A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*", "matchCriteriaId": "B292187E-8EAD-49D2-B469-B14CA0656035", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*", "matchCriteriaId": "C7D131E1-24C1-48CF-B3DD-46B09A718FB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*", "matchCriteriaId": "0ABF1231-73CF-4D1B-860C-E76CD26A645E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*", "matchCriteriaId": "F7F88E38-4EC4-41DB-A59D-800997440C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*", "matchCriteriaId": "32FD6647-4101-4B36-9A9A-F70C29997148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*", "matchCriteriaId": "D248D668-A895-43B3-ADEF-1B22EE7DC76E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*", "matchCriteriaId": "858411B5-E904-45FA-8B33-5CC73B915B22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*", "matchCriteriaId": "6BB9336C-C893-4AB0-9402-868CE9960058", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*", "matchCriteriaId": "A4695F94-7AAE-4219-9EF6-CE6D0838192D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*", "matchCriteriaId": "BD7A0991-73F0-410D-855C-BFC88A66E61F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*", "matchCriteriaId": "FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*", "matchCriteriaId": "9858EAC3-C1CE-449B-A605-FFA337DA825D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*", "matchCriteriaId": "E7A8F905-A4C6-4EC6-B9E8-800948350B89", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*", "matchCriteriaId": "565B48E3-1406-4E3C-B4A5-35865C5614E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*", "matchCriteriaId": "46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*", "matchCriteriaId": "8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*", "matchCriteriaId": "191A094B-E354-4767-AD43-87CE140BF851", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "matchCriteriaId": "C1289B9E-5725-42EF-8848-F545421A29E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*", "matchCriteriaId": "238A21CB-F8C5-468B-B523-6D014E2EA8AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*", "matchCriteriaId": "0DC52CDD-614D-4EA0-8DA8-D71189C42E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*", "matchCriteriaId": "A3A630E1-6CAE-4809-AB18-5002F158AE90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*", "matchCriteriaId": "A67750FF-EF4B-414F-8ED4-299CAF33B0DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*", "matchCriteriaId": "5A82D885-82F5-4755-BC11-5899E28CEE42", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "matchCriteriaId": "88AF1366-8A14-4741-8146-886C31D8D347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*", "matchCriteriaId": "7FD75301-E29C-47DC-B53F-DC44EA0C1885", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*", "matchCriteriaId": "8C944024-BEAA-43AF-A339-FD69C75E8240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*", "matchCriteriaId": "435C69D1-3932-4379-8D18-B1E12D558325", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*", "matchCriteriaId": "3572B700-73C0-41D1-95FD-FE9D5B0C1F80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*", "matchCriteriaId": "97A40DC9-0D4E-4C91-8D1B-3CED95B3952E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*", "matchCriteriaId": "16FB3E4B-05F8-411A-8C86-4ACE03815553", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*", "matchCriteriaId": "8E55EBC1-6F96-47CD-9503-7855EFB07240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*", "matchCriteriaId": "4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*", "matchCriteriaId": "F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*", "matchCriteriaId": "A1789924-FADB-4076-8874-120B29EE6B86", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*", "matchCriteriaId": "BC246667-2F6F-4024-9EAA-2CE3018235C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*", "matchCriteriaId": "B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*", "matchCriteriaId": "1341A5D4-A5CE-4D31-A178-01C3069D7A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*", "matchCriteriaId": "86A5C199-92E5-435C-AC40-175849285104", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*", "matchCriteriaId": "67589F54-0A54-4DE7-9A47-A73DD05F7965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*", "matchCriteriaId": "DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*", "matchCriteriaId": "8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*", "matchCriteriaId": "92C5DC8C-3318-440B-8B29-4827F343927B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*", "matchCriteriaId": "0ECC47D8-F602-4CEA-B19A-209CE76C9D36", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*", "matchCriteriaId": "7514ADD3-DECC-4CC2-9421-A609E526FDC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*", "matchCriteriaId": "691097C3-F91B-499B-BAEB-4E7E9C43B517", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*", "matchCriteriaId": "0B3DB1ED-017B-43EF-92A3-A8A88669FBC2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*", "matchCriteriaId": "19A49AAF-0F08-4151-8F74-4EF9C3415B00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "3F7A2018-BB4D-4DC1-813D-A4AA3F270893", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*", "matchCriteriaId": "A95D91C4-C539-4458-A6C9-8AE17207AE30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*", "matchCriteriaId": "37F9D218-8198-42C7-88FE-7C5382138324", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*", "matchCriteriaId": "CF8FDD81-95EE-4241-93C8-925085A4CE7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*", "matchCriteriaId": "614D9E35-10E0-4CCB-B817-C7C8C3947BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*", "matchCriteriaId": "F75F987E-F4DB-46FF-B048-21B4A4C07B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*", "matchCriteriaId": "05376F2C-30B6-406D-90F7-6C2E00E85171", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*", "matchCriteriaId": "CCDD3DF6-24BF-4C13-8F07-AF07327E5622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*", "matchCriteriaId": "B1520A64-2157-45D7-A135-F900798C4EB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*", "matchCriteriaId": "05A30F85-5367-4369-B7A5-176D71279FC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*", "matchCriteriaId": "B8803FF9-48D7-4AB0-8A17-4590CABD0BFD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*", "matchCriteriaId": "1DC63B6B-5D6D-477B-9125-007F835981B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*", "matchCriteriaId": "BF385AC9-963E-4670-95A6-BE1EBC3890B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*", "matchCriteriaId": "943FA088-2902-45A9-A1BA-D612B46A50D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*", "matchCriteriaId": "8C80902D-9A6C-47D4-B56F-35C378FC0E63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*", "matchCriteriaId": "1100B46C-8485-4048-BFF8-2BAB311EC04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*", "matchCriteriaId": "4B9E1646-E154-41BA-B9FA-0839A898023D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*", "matchCriteriaId": "03F4C8E6-0043-41A8-94EA-EEBAA1A081E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*", "matchCriteriaId": "31C10985-CBF7-4717-A7D6-2594887D7CB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*", "matchCriteriaId": "8C49886C-B6A0-4D95-8533-329FE5A66F6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*", "matchCriteriaId": "0788CF23-3FAF-44C9-9AAA-96E4818A1AEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*", "matchCriteriaId": "24AF7001-64D1-4BFB-9280-0BA0FAD97A0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*", "matchCriteriaId": "8C6E420E-16DA-4FB1-9968-C93E229614FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*", "matchCriteriaId": "07469E04-B3D2-41FE-A2E4-E25A977026CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*", "matchCriteriaId": "60FF402E-5E4F-414A-A3AB-149548303616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*", "matchCriteriaId": "79E2B875-A270-45C0-A1B1-041264E5B290", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*", "matchCriteriaId": "8C828C8C-7ECB-4167-87A9-0F522C400C66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*", "matchCriteriaId": "0C2C887F-1EF7-468A-A6AE-440793C78DAC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*", "matchCriteriaId": "6F2F3D7F-D884-4ACD-A103-060F57A9867B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*", "matchCriteriaId": "BD1FCAAD-7072-45EC-9ACB-08556458BAF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*", "matchCriteriaId": "C4446224-40E8-4AD0-8197-921D3473E19B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*", "matchCriteriaId": "4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*", "matchCriteriaId": "B92B68FD-771A-4401-8B1D-B1A252356F62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*", "matchCriteriaId": "1B933941-0BE3-4EEB-8FDD-2DAA63343EE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*", "matchCriteriaId": "8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*", "matchCriteriaId": "36F737C1-6011-42D2-9690-CA81EA0A283C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*", "matchCriteriaId": "19CA7EB6-D1C9-48D9-A69A-2618800A6CE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*", "matchCriteriaId": "0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*", "matchCriteriaId": "ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*", "matchCriteriaId": "56C909B0-8FB2-4220-AF93-EECB8D650CC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*", "matchCriteriaId": "FF36BAD0-A762-4F84-BE0B-060FE666ED67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*", "matchCriteriaId": "007337CD-94FB-4ED9-B4A3-9E0EC52D79B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*", "matchCriteriaId": "BCDFA137-F1FC-46BD-9872-D62671B1434D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*", "matchCriteriaId": "2E6DBCB3-E912-43A1-914B-5C7CCFAADE25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*", "matchCriteriaId": "0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*", "matchCriteriaId": "E2C67312-E128-4833-A91E-D7A9F96A7AD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*", "matchCriteriaId": "3F19F408-FABD-4A68-8CDC-C763F0321FB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*", "matchCriteriaId": "68A06EC2-E491-4CD5-9904-61A88EBB7FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*", "matchCriteriaId": "789A8CAE-8D9E-4244-880D-FBE28EC53AED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*", "matchCriteriaId": "F901EE11-D0C9-46F6-8316-D8F4F1D50260", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*", "matchCriteriaId": "E549F600-B9CE-4843-A772-2DACC528903E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*", "matchCriteriaId": "3F28E733-87ED-4610-A8EE-BD37BED7685B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2832E8BF-7AC7-444C-B297-66F770860571", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "44AA72FB-E78D-419E-AA82-B0538C6504D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "687C3BF3-D71A-49AD-8A05-EAC07CBCD949", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "90AF90D9-16C4-4F8A-9868-3E2823E3445C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "3C063C53-8970-45B1-85F8-FB2080BF4695", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "64596ED7-794A-4D23-987B-D9AD59D48EA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "A561A8E8-79E2-4071-B57D-590C22EF86A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "92E46658-60AB-4758-9236-3AC0E6464383", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "matchCriteriaId": "207B8FBA-E2FF-485A-9AD9-E604AE0FB903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "33F99640-C753-40BE-A0A1-4C2D92E7DB09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F98247B-1839-4676-855B-827A4B6C016B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDBA35BD-1048-4B6E-96B2-1CFF615EB49A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6CEEEE2-D6A2-4342-8A73-934093948824", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "979FEE9F-A957-43B6-BB6D-1A851D6FA11C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AF59D-D05E-47F9-B493-B5CD6781FDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF7EC93-0170-45A9-86C7-5460320B2AE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5F803AC-DCC7-43FC-BEB3-AA7984E0506C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "560993AA-299D-42B7-B77F-1BD0D2114CCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C582B1C-1DAC-48FD-82DD-7334C10A2175", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7862B0C-2C44-4110-A62A-083116129612", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "048C5996-F719-4338-B148-0DD1C13E02FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF7FB-AB5A-4549-8C15-E69458C649E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CEF6608-B650-4C77-9823-0AD57B3484F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BE6A2D7-901C-45F9-B487-D674047D522E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ADCB509-5B0E-4592-8B23-EC25A3F79D41", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB51691F-089F-4016-B25E-238074B06C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA37503-FD3D-4220-933C-234631D6EDEF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "matchCriteriaId": "72992831-2A76-456B-A80C-944BDD8591E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79C2131-5566-4CC2-B6ED-38E3F6964500", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "matchCriteriaId": "60BFDAA6-3DFC-4908-BC33-B05BAB462F94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6266056-770A-4E2D-A4FC-F1475257648E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "929AA8F3-8BDF-4614-9806-6D4231735616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "605D7552-8184-4B11-96FD-FE501A6C97DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3144BBDE-CC96-4408-AA02-ECC3BF902A34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B8BA77A-34E3-4B9E-822A-7B7A90D35790", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7165B43-ED22-4714-8FA4-1E201D1BFA69", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CFB133-FAF0-431A-9765-8A9738D6D87C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "matchCriteriaId": "2975B0F2-DB7C-4257-985A-482ED2725883", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "70221E07-3C2E-4A82-8259-AD583EB5CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "427DFD78-56CD-43C4-948E-F53AF9D669F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AD7649-3FEA-4971-9886-6C9312B937A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4EE972C-6BAE-4342-BA01-1D685487F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDFE3B-C064-49A9-BD43-3F7612257A74", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BD0EEC1-D695-41A5-8CD6-9E987A547CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF25B8-D474-4C6B-8E45-F57DDC7074E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DF18FD1-6670-4C3C-8000-A079C69D575E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "921EB5A5-F911-4FCE-A6F1-C66818B34678", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "023063E1-2DD7-487C-A8A7-939FAEE666A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "77255CE6-D7B7-4B48-993C-7100A1170BC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40AC368-3A14-4EFF-A8D0-7EFB4C83045D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C07E80D5-70A5-49C9-9044-D683C7ECCFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "63668AF4-F29C-4424-8EC5-2F0A5950DD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86616FE-0C3F-4984-A364-8A6A9F01DAD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C1C7CD-538D-4D7A-A81C-10DF5376A479", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5922F749-2B23-44B8-8A46-F31BCAEAD279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D75D0EEB-707C-4C86-A569-E91E9F00BA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FB0E20-0243-40A1-8DEF-37150791222E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "68CFF26D-8AD3-4179-9E4C-F06D7C858C9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7541572C-229F-4963-B7F0-06EB3323E53B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "matchCriteriaId": "85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "479F7C77-D16F-4E40-9026-3EB8422E0401", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DB08C8-0018-4A8E-A206-097BDDF83B08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7193E85-30BE-42D5-A26B-3F88817F3574", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "446E8515-45FC-4B8B-8D12-60643D64C07F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDF6B2-D388-4639-87D8-064AA3F6B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "00AAB8B6-B614-4EAA-BA90-C5326CB5D07A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A371DF9-E224-404F-99C2-C2A4607E62D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F40E356-365D-44B7-8C38-A0C89DDD6D3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3132029-89F8-4359-A0DC-A275785266A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02F5685-0636-48AB-B222-434CA1F3B336", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ED4693C-DECF-4434-90C0-56158F102E7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB408A6B-0842-43DA-9180-B0A299FCBCE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6215EBAC-7C75-4647-9970-482120897F1F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D1FD6E8-80EC-461F-9ED1-CE5912399E80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E96F585E-BDEF-45EE-B0AB-94FE23753AC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3279C067-3058-4D46-A739-05404FD0E9B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "matchCriteriaId": "DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C0855225-F501-486A-BD03-2A86FD252B5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "matchCriteriaId": "214C7B0C-C438-4000-9F9B-6D83294243AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4C91AA2E-4BB2-49C8-9364-4E363DF42CB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DA26781F-5A1C-4DA5-835E-D984D697F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA4222-F25D-4457-80AA-6D05CA918D68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "matchCriteriaId": "9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "6777AC35-9D1F-4153-94AC-B25627D730E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "matchCriteriaId": "A5F063F4-8994-4E46-BA7B-A12A112009BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "matchCriteriaId": "4D6F2DE5-AF11-439A-8D37-30CB882ECD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E213DD86-5419-42C8-BF38-7795DDB3C582", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A972291E-5231-439D-873B-2F87BCAF800A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C089CC54-3229-43D7-AA15-73CFA1A43EE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "matchCriteriaId": "EF268D83-C15D-4559-A46F-844E1D9264F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CFE97C0D-3EA1-4314-A74A-7845C7778FB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "matchCriteriaId": "34293F29-F327-4ADD-BF62-78F63F79BB96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "matchCriteriaId": "528C0A46-1CC4-4882-985A-0BB41525BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "matchCriteriaId": "643F3522-A452-4927-944D-532574EC4243", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "matchCriteriaId": "58F40B78-4DBA-44EE-8420-086789EFF53D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "matchCriteriaId": "423BFD8F-4B50-43DA-9979-75FD18FBC953", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8BAD4A68-0481-476F-BBBD-3D515331368C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "matchCriteriaId": "838CEB7C-7C4C-416C-86CE-6E8DD47EF25B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "matchCriteriaId": "CC7D021F-3C97-45B3-B1F7-0AC26959F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4A31AEF3-448D-417B-9589-4BA0A06F2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F7A1D96F-7FFD-413F-ABCE-4530C3D63040", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "matchCriteriaId": "4B8343FE-1320-40AE-A37F-70EF1A4AC4B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD42BA5A-7DA0-409D-8685-E43CF9B61D9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A5FF80E9-CF28-4EF6-9CFE-4B500A434674", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "matchCriteriaId": "647B77A4-2F49-4989-AF43-961D69037370", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "matchCriteriaId": "805B1E33-F279-4303-9DF3-C81039A40C1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "matchCriteriaId": "B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7E0AAE-6539-4024-9055-BE0BAD702143", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7F1A8828-0765-4799-AD6C-143F45FAAD23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "matchCriteriaId": "12D34618-1CCA-405B-A49C-EB384A09C2C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "575D6061-66BC-4862-BC84-ECD82D436E2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "matchCriteriaId": "56B6EE64-1AD4-46B2-BA65-BB6282E56EB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "matchCriteriaId": "11650B45-0BDA-42BF-AEF3-83B48DD6A71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "matchCriteriaId": "BD3C92BA-827B-48AF-BBB3-FB60A9053C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "matchCriteriaId": "AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5EB44CA7-DFE6-4B1A-9A63-97AE30017E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4B305EFA-6226-412C-90EE-F0691F2DDDE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "matchCriteriaId": "7F3874FA-63CB-4B5D-8B64-CE920320A4E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "matchCriteriaId": "0800ED17-50E4-43F3-B46C-591DFA818BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "matchCriteriaId": "A46B0405-F301-4209-8766-6E12EAFAD157", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F99F9F1F-A967-4884-96CF-4488102DC0A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "matchCriteriaId": "DA9B37AD-4599-425B-B39F-E571F4975266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C5A5F1CF-A1E6-45F1-8B09-36566778DB57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "matchCriteriaId": "698C8A49-888B-4675-B3B0-25EDE2FD515E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "matchCriteriaId": "70D98F97-8EF4-48B5-84BE-C3CC27031FDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "matchCriteriaId": "B473D1FA-909B-492E-9C5B-94B0E20E1C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "matchCriteriaId": "BFD5EA7E-322E-4CE6-89D4-7DB1055C9034", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "matchCriteriaId": "67836379-4E1A-45CD-9506-7D3F612E47C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "matchCriteriaId": "5B1BBC61-8664-4452-93A7-DDB4D2E4C802", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "044F0375-DF2F-4D9B-AD7E-473D34165E8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "matchCriteriaId": "2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4A0655CA-A88C-4632-9A18-560E3F63B2F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "matchCriteriaId": "8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C6965851-3B29-4C21-9556-97FD731EAA85", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "matchCriteriaId": "52984FD2-44E0-4E91-B290-0376737EEF6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DF933366-7503-4F8D-B7AA-F6A16210EC37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4E2DAF5D-5BB7-49C6-8426-8B547505B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3EABB21D-D021-434B-B147-CAF687097A5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "matchCriteriaId": "7609424D-95F1-4493-A20C-B1BA4EC6439D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "matchCriteriaId": "966DC636-C802-4D9F-8162-652AFB931203", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A75794EB-A5AF-43F0-985F-D9E36F04C6D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "matchCriteriaId": "31C2CFF0-98FD-4A0D-8949-D554B2FE53D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "matchCriteriaId": "05F9217F-5028-4659-AA8E-F60548DE4D52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4AC769DC-CF2E-4A3C-A610-264F024E6279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "matchCriteriaId": "9B2B1CBF-D155-49BC-81A4-4172F177A5C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "370B2B32-519E-4373-8A04-5C5025D688BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "83D9B562-C279-4A55-A347-F28FC4F9CD12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "2A8C2BA0-48A8-4107-8681-A7C34C553D8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "B1B009DE-A82F-4569-9B42-EC1EC4DA8A40", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "683B6E83-37FF-4F9B-915F-059EBB29DB53", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E218718F-4BE6-48B0-A204-9DD4A932A654", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FB0AB327-B60A-473C-9D36-97766EE62D7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA249EE-4786-4E27-8787-5E8B88C2AEB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBD0529-1CF3-44E5-85B3-19A3323C9493", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D664EE97-07EC-410F-94C3-AEAB2C6A627D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "D31DB981-03B1-4A84-8D87-CD407C3C149F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CBD155D-89D9-4677-A621-4D7613BE65C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02BD0D4-FFFD-4355-97D8-170362F10B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6635781A-2651-4EF2-A5AC-AEEEE63FDE6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DCE6930-760A-48C0-B964-1E3ED6A8517C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E52DE90-DF96-4CE7-B8D1-226BA50E4D09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8EB40E7-9B91-4106-B303-2B70AF395BFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB0D5CD-8AF3-409D-96A7-718641D4B90D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E420B0B-0CD5-41C7-B25A-3DB856055F9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B0C295B-0D63-4BE7-830D-D927E00C301C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "matchCriteriaId": "605C340D-2220-4669-B827-9009CB099E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8791879D-2908-4F57-8DB3-6D24100A9108", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E823DC5B-98BE-4656-BFBF-3A7018F8F213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E8D558-ADE0-4358-9C76-7BD77BF23AA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7973B3D0-F244-4E26-88F5-A2D9BF2E4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "matchCriteriaId": "68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5CB567-4F86-4466-BE4D-BFF557ACAE0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A52611B-6583-4660-90D7-C9472728072B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E80C6E89-B57C-47BB-8B95-50C03DFB3B96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9AB685B-FEE1-41EF-A046-1B34619E12A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB9F6724-967A-4AF0-9896-12BF6164B2CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC1116BF-12D7-47CC-98DB-18B200CF9C16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FBB28DE-726B-4AF0-88A5-35987E1E648B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1880E2B8-5E0E-4603-8D17-3ABA43D28179", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FAFBB92-1917-4238-832B-195FBE418271", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "91DFDF3F-9A3F-42B8-99A1-A3F76B198358", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "matchCriteriaId": "8778F972-BF34-482F-9FA7-71A77F6138E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F288BB0-FE7A-4900-B227-BE80E4F4AADF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E16338-A094-4CA9-B77F-6FE42D3B422C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E07AB33-5351-487D-9602-495489C7C0B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "matchCriteriaId": "22115ED6-1707-4840-B0D1-AD36BC0C75A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C633BC-831F-4CB7-9D62-16693444B216", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD501E1-E78F-44C6-8A13-C29337B07EBE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "matchCriteriaId": "9085BA0B-B7E2-4908-90C0-B4183891C718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "matchCriteriaId": "81971C2F-137A-4F11-8C93-3B99D4CD1B58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E0BDAC-398E-406B-B2DB-AE049D6E98B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFDE6C-DE58-4C4D-882E-474EF6C3D934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "matchCriteriaId": "950C6BF9-AA47-4287-AC01-D183237490FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2355181D-D8EE-4F80-8280-13D5CBCF4779", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5209343F-66B0-4DC0-9111-E2E64CFF7409", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "720109A6-B79E-48E1-9AE7-7708B154788E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "82FF0DBD-AE13-4232-80F7-F4C2E2CC9721", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E944ED-8C02-46B8-BF95-0CE4C352753B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "matchCriteriaId": "77AEA3D1-4846-46E2-9B80-20B19F00DC11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1576978F-E93D-4A47-90B6-6A4E3A7DE558", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D339FE5-001F-4005-88A5-CFFE37F9B63E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BDABA86-497E-497E-A5BA-46F913A4840A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD886F4C-DB6F-4DDD-9807-8BCBB625C226", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4C454B7-E5F4-4AAE-B577-FD71FA002C8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "38BE2781-3A06-4D62-AC8B-68B721DA526B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DA23772-2EB8-4BEE-8703-26D967EC4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "72DC766A-B1F9-4B83-9F9B-CF603EE476BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA594740-43C5-4F42-BA5B-00CA8AE7BB60", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "572B16E2-8118-43A0-9A80-5D96831D55FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB5C551-BADC-4A3A-93E5-2EBCA0704C51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5383B7A3-1569-4FEB-B299-B87CE8C8A87B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A05BBDE0-6C47-4489-9455-7DA7D230ECA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "matchCriteriaId": "1789AA69-EA31-44D1-82E6-228E48E18586", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A7D5FF-3B1F-4C64-BB81-7A349765520D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F0498B3-393A-4C32-B338-E6014B956755", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C451F752-6869-4AFA-BAE5-5C9A54427BF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "83710FD1-099B-436D-9640-061D515E10BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "517B71CE-6156-40E1-B068-A2B733E205E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "11DEEEE5-5055-4CE1-962C-C5F075F4CC02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "matchCriteriaId": "8718DDAB-3208-48CF-9BCE-54DA1257C16A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1AA901-E822-4240-9D82-C9311E4F87B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1CDE3DF-8E79-4997-94EB-B517FFCAE55C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "12A0DE13-EB0B-493B-BC84-3AEB3D454776", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "matchCriteriaId": "1727697B-1F59-4E29-B036-C32E9076C523", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E69E827C-C0D0-46C7-913A-1C1E02CEAACE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2528F3F9-34DC-41DA-8926-382CB3EF5560", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E452C262-5A8D-4D97-BC7F-A4F5FF53A659", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D57BF69-D750-4278-98AA-976B0D28E347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "76ADAE30-6CAD-4F5B-B6F7-C18953144C63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A25D792-E21D-43EE-8B9D-67DE066DE5DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C669783-C058-4B4F-BB9A-84B2C4682247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "matchCriteriaId": "159B088B-9A85-4CAA-854A-AA080E528F95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBE74A94-FE8F-4749-A35A-AB7D57E24913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "990AC341-0E67-4A81-87E9-EE3EFD9E847E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BC18B0-58F1-4477-9978-CA7383C197FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "matchCriteriaId": "474992FB-842D-4661-A565-44AF2CD78693", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "476E1B79-5342-4895-96D7-E97DFC1F5334", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD318D5-89A6-4E28-939C-C5B61396806B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32C7E89-32ED-4328-9313-FA7D3DDBDC58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2792EED8-2CBD-478E-BC09-05FE830B3147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B1AF2F-6E48-4DBD-A60E-3088CA4C3771", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "matchCriteriaId": "34E1691D-65B3-45E4-A544-8B29E38D569D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "matchCriteriaId": "E42F2703-B8AB-410E-AF7B-CD0BE777F061", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "matchCriteriaId": "31244C94-00A3-499C-A91A-1BEF2FB0E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "matchCriteriaId": "878FF6E8-8A6D-44CE-9DD1-2C912AB8A193", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5078A95B-2BD8-4A37-A356-F53D1A53CB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "matchCriteriaId": "0BFE67CD-DE53-4C4E-8245-35902AEFA6E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "matchCriteriaId": "9F231D31-3AAD-4C5D-A225-D2DF94486718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5998DF5D-E785-45EC-B8D0-1F4EC4F96D50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "EADFD013-0BFB-427C-98E6-F9E4774DCBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "58620B10-FEA6-456D-B6B5-2745F5DBE82D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "matchCriteriaId": "E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4858A1F0-97F2-4258-AB98-027BF1EC5117", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3C961A8B-EAFD-4F66-9432-BCC0D154ECCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "matchCriteriaId": "052DE6CD-A1E7-4E81-B476-66EF451061C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "matchCriteriaId": "3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "matchCriteriaId": "751B3AC8-D45E-46B6-83D5-311B693F3C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "matchCriteriaId": "9588277A-0B97-4408-9CF7-11271CDAADD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "matchCriteriaId": "479FE854-85E5-4ED0-BFAF-2618C9053082", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "matchCriteriaId": "E048B9BF-77C8-49F7-9F2D-9999F79BA264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "matchCriteriaId": "6CD16D4D-E816-486D-96F4-5A2BF75B959F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "matchCriteriaId": "169C558E-1A83-47D5-A66B-035BD1DD56FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "matchCriteriaId": "D683E509-3FB2-4175-BCAB-4EB1B5C04958", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "matchCriteriaId": "6FCFA915-5445-4732-9F8F-D7561BA4177F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "63A9FD98-C22D-48F6-87A1-60791C818A1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "matchCriteriaId": "85F99F24-1783-4E6E-BE61-04C2E80356ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "matchCriteriaId": "74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "matchCriteriaId": "85289E4C-C813-4677-867D-EE8E98F4A1A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "matchCriteriaId": "27C8150F-BEFA-406D-9F0D-E7CB187E26AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "matchCriteriaId": "1E807F90-819F-4103-B1F7-4CE46971BD63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD93203F-71B9-4F87-B5D8-FD273451C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "1E652C74-C48D-4F29-9E85-09325632443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "99158191-3013-4182-8A53-5DFCA1E2C60A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "matchCriteriaId": "F7E39A3E-7EAE-47C9-930B-58A980B73FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "matchCriteriaId": "FFDA54BA-C00D-4890-9B7F-328257607B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "matchCriteriaId": "1F5EFB1E-334C-4B55-8E2E-6AE19B34774D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "B8260DCA-2F0C-45F7-B35F-D489AF5639F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "matchCriteriaId": "7778F81B-6D05-4666-B1D4-53DB0EC16858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "matchCriteriaId": "5DC6706A-61F7-4AA0-B2FF-0FFDF739A644", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7EF1B16B-02F2-4ECA-938E-B5CDCFC67816", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3C5501D8-1B0D-4F5A-AFD7-C63181D3281F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "matchCriteriaId": "1751F0CE-A0D3-40E2-8EEC-D31141FE33A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5FF9AFA7-BBE8-4229-94CB-5A9596728BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "matchCriteriaId": "E23A777F-68A4-4217-A75A-4D8A27E6451A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "matchCriteriaId": "2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "392A4337-11F6-4980-A138-4FDBCAD0EBA4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E2E9BB67-F1FF-4190-889F-78B965CCE934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "matchCriteriaId": "F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "35607317-0928-4297-A33E-D44BEE1BBEC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "matchCriteriaId": "D48323B1-7FEB-451F-A064-23E7CE7F6403", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "matchCriteriaId": "29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F5763189-7980-4A72-92C9-1908FE9E15EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "matchCriteriaId": "C53ACD49-DA21-4DDE-A0AA-FCCD59D29886", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4326D350-EBC2-48E6-A2C6-0499F6826CEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8594E6FE-B6DB-4343-B3DD-AEC19923DAF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5BCADA00-E453-414D-9933-FCB43D21BBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E62212D9-F707-4A8E-AB2A-A3985E7A4049", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "matchCriteriaId": "561755A8-8AAD-4F41-8266-747EFDAF2D55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "matchCriteriaId": "E6F4BB0F-DAF4-479B-B78A-7929C151AA1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "matchCriteriaId": "A207312E-1D35-4464-A111-22C4C793E146", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E9B16E32-07D5-445B-BAA5-4E4A0881BFC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7CF08F6B-2ECB-414C-82D7-C06085BF8B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "matchCriteriaId": "21032BE3-74D8-4C3F-B461-158F475B6853", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*", "matchCriteriaId": "F6E468FE-73BE-4B20-B774-58EC7CD20CDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*", "matchCriteriaId": "0FF6B19B-7D45-44B3-8524-407253B93EEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*", "matchCriteriaId": "2B803FAD-E54D-49FE-A078-029B8FFBBB98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*", "matchCriteriaId": "CC511505-ED67-45B4-B76C-56AB750C4408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*", "matchCriteriaId": "A430C232-79EB-4264-AE24-41D4A2A5D990", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*", "matchCriteriaId": "3A9E3D4B-A3DF-4858-8C64-0316B6E57435", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*", "matchCriteriaId": "19108672-E1AA-41CC-B86C-061D3721C8B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*", "matchCriteriaId": "200D36CF-AEDE-4183-8C54-748E6E5A3218", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*", "matchCriteriaId": "4CF13A44-5163-4282-8EE8-7DC05499B5E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*", "matchCriteriaId": "827C12CE-D87D-489D-ABA7-BE0405EC33D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*", "matchCriteriaId": "16AA78F7-520B-4FFC-838C-DC74FEE8E13F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*", "matchCriteriaId": "A51E86F5-8F94-4E7C-9A63-DAA3FCBE0438", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*", "matchCriteriaId": "001AB619-157E-40B4-B86C-5DB18245D62F", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*", "matchCriteriaId": "1221FB4F-488A-4A52-8788-82ECBF92113B", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*", "matchCriteriaId": "38D51E27-28A3-47A1-9C36-1A223858E352", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*", "matchCriteriaId": "365DF3EF-E7D1-41FC-8382-D3B095542D59", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*", "matchCriteriaId": "D0B2B122-34A9-4534-A996-8FEAACA71A05", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*", "matchCriteriaId": "C850453B-CDB1-490D-B551-9AC0B27D8A67", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope." }, { "lang": "es", "value": "Los sistemas con microprocesadores que utilizan ejecuci\u00f3n especulativa podr\u00edan permitir la revelaci\u00f3n de informaci\u00f3n no autorizada a un atacante con acceso de usuario local mediante un ataque de canal lateral en el predictor de saltos direccional, como se ha demostrado por una tabla de historial de patrones (PHT), tambi\u00e9n conocido como BranchScope." } ], "id": "CVE-2018-9056", "lastModified": "2024-11-21T04:14:52.893", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "[email protected]", "type": "Primary" } ] }, "published": "2018-03-27T17:29:00.820", "references": [ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*", "matchCriteriaId": "8F249992-79C7-4005-9804-97FFFAC658E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*", "matchCriteriaId": "81C6DAFF-FD39-434C-8426-4BE5F39355EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*", "matchCriteriaId": "2EE259EF-22F6-4AA1-BDF6-448E15B96F14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*", "matchCriteriaId": "EFED12C9-2563-4036-BEBC-DD9D67095917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*", "matchCriteriaId": "18155178-43F1-48A6-AC0E-9578031F7F04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*", "matchCriteriaId": "4C47688B-1D40-4D73-B363-E2E8230588FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*", "matchCriteriaId": "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*", "matchCriteriaId": "72BF929E-1288-448A-83A4-D26D86D26EF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*", "matchCriteriaId": "C8E4CB07-1768-4C18-ACAD-73773042C752", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "31465D8E-A705-4AE3-AB2A-C296554E514C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*", "matchCriteriaId": "D8B2D356-DD32-46E0-9459-67E10AE44104", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*", "matchCriteriaId": "27CDF6AC-7356-417F-84F6-33E9E3AA2082", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*", "matchCriteriaId": "E8E6F0AF-78AC-4257-9164-A9A4CCA05968", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*", "matchCriteriaId": "5DA61740-3E29-4820-9897-9BCB90490D49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*", "matchCriteriaId": "633350BA-34B4-4927-82B9-B44D1286D8FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*", "matchCriteriaId": "D2E687A6-87AA-4F3A-98AB-A164EC0EE051", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*", "matchCriteriaId": "53A8F993-32F4-487A-A33D-814BCDF1FAB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*", "matchCriteriaId": "09EC7A10-C2AB-4DD4-9C75-073344F635E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*", "matchCriteriaId": "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*", "matchCriteriaId": "0C83B3D2-E293-4D33-AE5B-1789466696DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*", "matchCriteriaId": "CB399F3F-7C6E-463E-B822-A4365A4C290A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*", "matchCriteriaId": "F5175C41-110B-4C26-80CB-C25DA11F639B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*", "matchCriteriaId": "63DAF721-A7E8-4263-869D-D9E100D7C598", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*", "matchCriteriaId": "F79057F7-72D3-4176-BBDD-E9A362153E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*", "matchCriteriaId": "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*", "matchCriteriaId": "FD65648B-B7DB-432F-8F88-6C624F94F809", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*", "matchCriteriaId": "7A949D34-E086-4821-B73A-DCCFDD6C5616", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*", "matchCriteriaId": "93055544-064D-46FE-92E4-48F69DDD29B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*", "matchCriteriaId": "9A98184C-18F5-424C-BB74-9A8094B5992C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*", "matchCriteriaId": "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*", "matchCriteriaId": "3EB52214-6E22-49BF-B2F6-0AA282108E0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*", "matchCriteriaId": "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*", "matchCriteriaId": "F8E0DA72-76B5-4022-BBFA-B886F0F662CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*", "matchCriteriaId": "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*", "matchCriteriaId": "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*", "matchCriteriaId": "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*", "matchCriteriaId": "0F67F016-A068-4079-AAE5-B247BBAE1B2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*", "matchCriteriaId": "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*", "matchCriteriaId": "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*", "matchCriteriaId": "DD57E072-FF46-4637-B7CF-D6C2F3BA8782", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*", "matchCriteriaId": "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*", "matchCriteriaId": "4B18E14C-4DC4-4AEB-8792-968D893BA402", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*", "matchCriteriaId": "B706F7E4-8169-48A5-86D1-3592D3D9B845", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*", "matchCriteriaId": "808DAAA6-9047-49A1-BC0B-9D4725299CA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*", "matchCriteriaId": "57EFA3F2-5C76-48AF-931F-7463633370A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF59F0-9F30-448F-A109-B90FCC513CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*", "matchCriteriaId": "07EFB7B3-772A-476D-B30F-2A442F64928F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*", "matchCriteriaId": "41A69B9F-EF79-4642-A2A8-75395AD7506E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*", "matchCriteriaId": "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*", "matchCriteriaId": "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*", "matchCriteriaId": "6C6D7877-1990-481F-9CFF-81A2BD39DA6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*", "matchCriteriaId": "6A17D56F-D53C-4198-B7EF-95BAA4711B3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*", "matchCriteriaId": "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*", "matchCriteriaId": "E13892FB-C1D0-4C46-A171-9D055E58DE0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*", "matchCriteriaId": "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*", "matchCriteriaId": "DB830245-29AF-4F0E-9C12-6BED7E76609D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*", "matchCriteriaId": "17ACD170-347E-4DF5-AE0D-DF00854480A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*", "matchCriteriaId": "3B8BCF08-D863-435F-9E70-78C7542A3C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*", "matchCriteriaId": "9E57F037-EE11-4148-A214-0650A98A07F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*", "matchCriteriaId": "F641F2A7-64C7-43DB-862B-B7117E1B9CBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*", "matchCriteriaId": "51086E20-8A3D-4A68-8048-D385865D50FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*", "matchCriteriaId": "2621BF41-EFD1-4C8A-9426-A937B68DC71E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*", "matchCriteriaId": "713DC902-5264-42CB-BB22-3566A4528FED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*", "matchCriteriaId": "28554810-9989-47B2-9CF1-E421D534777E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*", "matchCriteriaId": "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*", "matchCriteriaId": "4DD23345-C583-4E30-A9FE-B0C485606ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*", "matchCriteriaId": "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*", "matchCriteriaId": "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*", "matchCriteriaId": "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*", "matchCriteriaId": "E8BBEBBD-8F88-474B-A40B-7270B500AAC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*", "matchCriteriaId": "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*", "matchCriteriaId": "7471E5CD-7211-474C-856F-51C199479407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*", "matchCriteriaId": "E785FA6F-A7BE-46A3-B384-029E55793DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A4148-B91B-4799-B055-21F4A7FA74A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*", "matchCriteriaId": "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*", "matchCriteriaId": "353E8397-B63B-4879-9D3D-610F65929184", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*", "matchCriteriaId": "D91D2C07-10D0-49F0-B353-19E34C438CEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*", "matchCriteriaId": "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*", "matchCriteriaId": "F18363D9-C7D8-4C9F-9A50-33725FFE6558", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*", "matchCriteriaId": "267E5275-7D50-4EF6-AB1D-7ECA894ED71B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*", "matchCriteriaId": "06B91A77-76F0-41CA-B23B-69F431F0D1AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*", "matchCriteriaId": "D9F01332-C259-4F3B-ABE9-C34DAC18FC18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*", "matchCriteriaId": "B9EA80D9-6A3B-42AF-B609-7429755BE504", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*", "matchCriteriaId": "40B500EC-20B8-42D2-A5DF-956C96FBEB12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*", "matchCriteriaId": "D55B01E2-6783-494E-BCB9-C75D2CA042D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*", "matchCriteriaId": "8D31A976-9C00-42AC-8DA1-D8B39564F456", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*", "matchCriteriaId": "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*", "matchCriteriaId": "A90F5756-47A1-4512-848E-3070E42506EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*", "matchCriteriaId": "FDB161B7-D329-41FB-97C3-2C1EB16F74C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*", "matchCriteriaId": "923D2D73-F953-44D2-9A25-E118136E8C5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*", "matchCriteriaId": "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*", "matchCriteriaId": "AE2AEDB1-8C35-4210-B045-69216480B384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*", "matchCriteriaId": "484C1B49-7D90-4360-BE33-C1DAB755ED89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*", "matchCriteriaId": "C08FE92E-D97F-40E1-8482-1DA777EBC785", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*", "matchCriteriaId": "2EBD6720-F788-4FD7-BC7F-AAEFAA137486", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*", "matchCriteriaId": "08032549-991F-465D-8794-21C8ED2C98D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*", "matchCriteriaId": "94514F41-CDCF-4EED-896E-8B5AE7360F0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*", "matchCriteriaId": "27F79141-5702-4157-8D13-FFB1C2F23FA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*", "matchCriteriaId": "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*", "matchCriteriaId": "FF8D239C-B3D6-4F08-AF99-E64752B72346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*", "matchCriteriaId": "207507FE-1DC7-4569-A5A9-392290622EC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*", "matchCriteriaId": "15FC32E2-9228-4903-9F0A-AF327A1C2D36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*", "matchCriteriaId": "FF50D5C4-DFC1-4306-B2C8-09D6788904FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*", "matchCriteriaId": "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*", "matchCriteriaId": "62783CBF-1299-4045-A0D9-E95E7B385164", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*", "matchCriteriaId": "3B04C754-50CD-4C8C-B56F-A50944EE5799", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*", "matchCriteriaId": "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*", "matchCriteriaId": "23BA712E-4516-4823-8E85-6AC24BE3240F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*", "matchCriteriaId": "7C1303D7-33B3-48AA-BD62-74984AD22AF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", "matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", "matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", "matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", "matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", "matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", "matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", "matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", "matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", "matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", "matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", "matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", "matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", "matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", "matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", "matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*", "matchCriteriaId": "8E0195D5-380D-401F-92EB-37AEA34E7478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*", "matchCriteriaId": "0E6AB8D9-FEA0-4830-941B-A2605830ADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", "matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", "matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", "matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", "matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", "matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", "matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", "matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", "matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", "matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", "matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", "matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", "matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", "matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", "matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", "matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", "matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", "matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*", "matchCriteriaId": "E40BD777-F766-4921-951C-7E38575ADA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", "matchCriteriaId": "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*", "matchCriteriaId": "55B1DB28-A0BE-40C5-BA4D-50354A085893", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*", "matchCriteriaId": "47859796-AA68-4E49-A625-9CBB49E5967A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*", "matchCriteriaId": "7FB51313-4B56-4045-A5A9-A2F2C1D21548", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*", "matchCriteriaId": "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*", "matchCriteriaId": "719CAF85-B1F1-4BF9-9217-6181339B20A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*", "matchCriteriaId": "F908E2B8-B4A1-487A-820D-57B1AC437754", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*", "matchCriteriaId": "ACDAC96E-D749-47E0-8DE4-BA0C74027330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*", "matchCriteriaId": "461A6DF4-EC6D-4DC8-A474-B219AE372FA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*", "matchCriteriaId": "60B23D94-D9F7-4EDE-9641-CE5670EB78C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*", "matchCriteriaId": "6F03C408-C457-4306-B26B-D21056B57AB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*", "matchCriteriaId": "2FB20448-852D-4B59-9517-DCF738140F79", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*", "matchCriteriaId": "5D2A6907-9CE2-465C-89EA-F1B84B31768D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*", "matchCriteriaId": "B3420C39-8177-445E-8501-49A4ED3998BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*", "matchCriteriaId": "049D03CC-7D4A-4D64-A3F4-0138717433CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*", "matchCriteriaId": "ACED82AA-7C7D-4089-9129-579CC6B063FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*", "matchCriteriaId": "24761232-F2C3-421D-A6AB-6FC100FE9B1D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*", "matchCriteriaId": "AAC00AAC-243D-437D-B613-1CF97CA58253", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*", "matchCriteriaId": "832281CF-98D7-42FF-8CF1-97632F8F7834", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*", "matchCriteriaId": "AE46D028-025E-4D37-9DF6-9BF385246923", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*", "matchCriteriaId": "3462E847-5100-4C4E-AE79-81D2857280AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D80BA-B6EE-451A-9D40-808B20E7B17A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*", "matchCriteriaId": "A65D4242-CBA6-413D-846C-72772C96E14D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*", "matchCriteriaId": "238B7D82-E552-46D5-9F66-1363F1610BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*", "matchCriteriaId": "6424D4A6-732D-4D4E-B099-E38FBFE1CF38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*", "matchCriteriaId": "177CA640-399E-4343-8DBB-E105E188CE3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*", "matchCriteriaId": "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*", "matchCriteriaId": "8C43C5A6-31B6-4946-90DA-60BBBA03861D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*", "matchCriteriaId": "CE15099D-6718-4AF8-BA3B-57DE1FE71289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*", "matchCriteriaId": "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*", "matchCriteriaId": "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*", "matchCriteriaId": "2B1BE9EE-4403-4983-89CD-A85C77846861", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*", "matchCriteriaId": "D28279AE-D876-4692-A54B-01CCD57AB61D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*", "matchCriteriaId": "E947FE61-02BA-46DB-AD95-692E33F74E6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*", "matchCriteriaId": "BD67AE51-56B8-473E-B5A3-89753D98481B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*", "matchCriteriaId": "47FC1445-5032-4BF1-9A1E-AF078BAC7676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*", "matchCriteriaId": "84181B90-DEEB-4291-86F7-7C65B51FBBEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*", "matchCriteriaId": "5A72734A-69D0-4FD8-95E8-997BC06B9676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*", "matchCriteriaId": "92C1C2B4-0431-48B9-AEA9-F6925268DE92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*", "matchCriteriaId": "A15B8BA9-3C75-492F-8105-C5F563653A1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*", "matchCriteriaId": "D670832E-8CB5-4861-8001-2E317CE7526C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*", "matchCriteriaId": "05DEAC21-5D6B-4224-BC50-54368CD9ECA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*", "matchCriteriaId": "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*", "matchCriteriaId": "6213C0D4-B0F4-4156-A467-4F29FA0E6093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*", "matchCriteriaId": "4288A260-F478-46A2-B18D-BD9CD797FE5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*", "matchCriteriaId": "159865EE-8852-4CBE-A3E3-D97C0D9CD89A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*", "matchCriteriaId": "1479FE1F-882C-4EA3-A05B-B5901D14D9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*", "matchCriteriaId": "BD701852-1959-429B-A631-2FE8390FFA31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*", "matchCriteriaId": "F687C73A-35F2-45A2-91E6-A43DCFAD463F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*", "matchCriteriaId": "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*", "matchCriteriaId": "02D3D433-30D2-4EBB-869A-79BB4B0AA879", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*", "matchCriteriaId": "D4701873-F7AA-40B8-AFD9-4A60D118574E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*", "matchCriteriaId": "77447A8E-7EAA-47A2-BA7A-434F7111693B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*", "matchCriteriaId": "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*", "matchCriteriaId": "777E076D-285A-4CA5-8886-080BD505DB42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*", "matchCriteriaId": "4FC42173-AD0A-40F4-8ECC-17B815F047B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*", "matchCriteriaId": "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*", "matchCriteriaId": "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*", "matchCriteriaId": "F8CE80B4-02EE-4CF5-B944-860AB16BADC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*", "matchCriteriaId": "BACC17D3-E255-4CCD-86BD-AADC9EC48E80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", "matchCriteriaId": "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", "matchCriteriaId": "580DF3D2-C365-43AF-9A48-F173072AA40B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", "matchCriteriaId": "32AD0A43-28BF-48F4-B363-F7A3A1BFE296", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", "matchCriteriaId": "9A747F9D-9761-4B8E-B01C-42018B25245A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", "matchCriteriaId": "DDA4CA91-DA96-4466-8969-3570C8E4343A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", "matchCriteriaId": "ECF29446-F253-438C-B1EA-B606186855FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", "matchCriteriaId": "C08277EA-676A-4D45-B66D-2488308CDEEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*", "matchCriteriaId": "994C51C8-AD87-4CDB-8EBD-4488D7604BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system." }, { "lang": "es", "value": "Corrupci\u00f3n de memoria en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 6.x, 7.x, 8.x, 9.x, 10.x, 11.0, 11.5, 11.6, 11.7, 11.10 y 11.20 podr\u00eda ser provocada por un atacante con permisos de administrador locales en el sistema." } ], "id": "CVE-2018-3632", "lastModified": "2024-11-21T04:05:48.263", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }, "published": "2018-07-10T21:29:00.937", "references": [ { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "matchCriteriaId": "CD028C10-FD07-4206-A732-CCAC1B6D043D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "matchCriteriaId": "704FAA50-1B7D-4917-AC4A-4C58785340F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "matchCriteriaId": "5C6B95D3-75BD-4826-BFBE-9701CC0FF052", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "matchCriteriaId": "F66E31A6-EA01-40C8-8718-CE2C1F45EEB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "matchCriteriaId": "DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "matchCriteriaId": "022F2CBE-EFB1-4962-AC91-D25AAB057DAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "matchCriteriaId": "69C05CD9-551B-46EE-85F8-D18FF878FE8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "matchCriteriaId": "2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "matchCriteriaId": "3C38C609-242E-4923-A81F-DAFBE7B6A927", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "matchCriteriaId": "A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "matchCriteriaId": "8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "matchCriteriaId": "D7AC7C56-2205-4121-99E2-001A7488E0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "matchCriteriaId": "A1677313-FF8F-493B-9DA3-C78F87581A17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "matchCriteriaId": "4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "matchCriteriaId": "85CA4444-5103-4451-8A7C-F6BBE714BBB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "matchCriteriaId": "FA1EB745-46D7-4088-93C6-E7156520B144", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "matchCriteriaId": "A93010C0-33B3-438F-94F6-8DA7A9D7B451", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "matchCriteriaId": "2A988A78-6B3D-4599-A85C-42B4A294D86D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "matchCriteriaId": "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "matchCriteriaId": "246AA1B0-B6C8-406B-817D-26113DC63858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "matchCriteriaId": "00EE5B42-FF05-447C-BACC-0E650E773E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "matchCriteriaId": "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "matchCriteriaId": "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "matchCriteriaId": "5D616C72-0863-478C-9E87-3963C83B87E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "matchCriteriaId": "CC333B0D-3A0E-4629-8016-68C060343874", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "matchCriteriaId": "6655535C-FF64-4F9E-8168-253AABCC4F5D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "matchCriteriaId": "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "matchCriteriaId": "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "matchCriteriaId": "1EACEF19-83BC-4579-9274-BE367F914432", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "matchCriteriaId": "24128A7F-2B0B-4923-BA9E-9F5093D29423", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "matchCriteriaId": "0990DD71-9E83-499D-9DAF-A466CF896CFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "matchCriteriaId": "9B7FEDEF-9772-4FB1-9261-020487A795AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "matchCriteriaId": "FE7B0F72-DEDF-40C4-887C-83725C52C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "matchCriteriaId": "9568C222-9816-4520-B01C-C1DC2A79002D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "matchCriteriaId": "53A1F23D-7226-4479-B51F-36376CC80B04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*", "matchCriteriaId": "BAB245C8-9918-41A0-9DFB-A11E4185C87A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*", "matchCriteriaId": "9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*", "matchCriteriaId": "F752A3C8-18ED-4765-B6EC-C664154EB701", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*", "matchCriteriaId": "B4F31C3F-7C0D-4D95-B4B9-89FD38076913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*", "matchCriteriaId": "5BEEE36E-E735-4A33-80B7-9407D072F6BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*", "matchCriteriaId": "2CB3D3DE-21BE-40C7-A510-AC97C92390DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*", "matchCriteriaId": "0D9A9545-38A3-460D-AB1A-8B03BEB405A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*", "matchCriteriaId": "1860D932-777D-41F2-94A2-D14AB1494AA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*", "matchCriteriaId": "75165A10-2FD5-4370-814C-B60FDE339AFF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "matchCriteriaId": "65AAC7A7-77CA-4C6C-BD96-92A253512F09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "matchCriteriaId": "FCD16C07-0050-495A-8722-7AC46F5920F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "matchCriteriaId": "01423706-C82C-4457-9638-1A2380DE3826", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "matchCriteriaId": "A881E2D3-A668-465F-862B-F8C145BD5E8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "matchCriteriaId": "3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "matchCriteriaId": "4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "matchCriteriaId": "6602DD69-E59A-417D-B19F-CA16B01E652C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "matchCriteriaId": "05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "matchCriteriaId": "40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "matchCriteriaId": "ED96AC16-12CC-43F6-ACC8-009A06CDD8F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "matchCriteriaId": "2CE9DC29-C192-4553-AF29-D39290976F47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "matchCriteriaId": "F625E647-B47E-404C-9C5B-72F3EB1C46F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "matchCriteriaId": "E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "matchCriteriaId": "B5878612-9825-4737-85A5-8227BA97CBA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "matchCriteriaId": "F453D348-28CE-402B-9D40-A29436A24ECC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "matchCriteriaId": "36322F4B-83D7-468A-BB34-1C03729E9BF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "matchCriteriaId": "0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "matchCriteriaId": "A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2A50E-94FA-44E9-A45D-3016750CFBDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "matchCriteriaId": "5625CAD8-4A62-4747-B6D9-90E56F09B731", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "matchCriteriaId": "43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "matchCriteriaId": "78DE1A01-3AEF-41E6-97EE-CB93429C4A1D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "matchCriteriaId": "410184AF-B932-4AC9-984F-73FD58BB4CF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "matchCriteriaId": "B265F073-9E0A-4CA0-8296-AB52DEB1C323", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "matchCriteriaId": "3F664223-1CBC-4D8A-921B-F03AACA6672B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "matchCriteriaId": "987A8470-08BA-45DE-8EC0-CD2B4451EECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "matchCriteriaId": "8BBC9542-FB77-4769-BF67-D42829703920", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "matchCriteriaId": "74FDC18B-4662-422E-A86A-48FE821C056F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "matchCriteriaId": "CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "matchCriteriaId": "CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*", "matchCriteriaId": "78E4461B-72F8-4F3D-A405-4AFA99EC8A32", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*", "matchCriteriaId": "663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*", "matchCriteriaId": "DAEDED56-9387-4DAC-BF52-C32ECCB7D407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*", "matchCriteriaId": "FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*", "matchCriteriaId": "E57A9B28-734B-401D-B24C-A295F364D8E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*", "matchCriteriaId": "F02289DF-4A02-4602-89B7-E9148236EE1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "matchCriteriaId": "723E7155-493D-4B5A-99E2-AB261838190E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "matchCriteriaId": "82E37264-E4BA-4D9D-92E7-56DE6B5F918F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "matchCriteriaId": "8704BE6D-2857-4328-9298-E0273376F2CD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*", "matchCriteriaId": "731F1E65-1D53-443B-8E2F-8AF11191AFA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*", "matchCriteriaId": "02A83822-822D-4A4D-B29B-A5BE6367A7DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*", "matchCriteriaId": "E8C32738-F08E-469C-8DE0-2708F30574A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*", "matchCriteriaId": "B292187E-8EAD-49D2-B469-B14CA0656035", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*", "matchCriteriaId": "C7D131E1-24C1-48CF-B3DD-46B09A718FB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*", "matchCriteriaId": "0ABF1231-73CF-4D1B-860C-E76CD26A645E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*", "matchCriteriaId": "F7F88E38-4EC4-41DB-A59D-800997440C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*", "matchCriteriaId": "32FD6647-4101-4B36-9A9A-F70C29997148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*", "matchCriteriaId": "D248D668-A895-43B3-ADEF-1B22EE7DC76E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*", "matchCriteriaId": "858411B5-E904-45FA-8B33-5CC73B915B22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*", "matchCriteriaId": "6BB9336C-C893-4AB0-9402-868CE9960058", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*", "matchCriteriaId": "A4695F94-7AAE-4219-9EF6-CE6D0838192D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*", "matchCriteriaId": "BD7A0991-73F0-410D-855C-BFC88A66E61F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*", "matchCriteriaId": "FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*", "matchCriteriaId": "9858EAC3-C1CE-449B-A605-FFA337DA825D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*", "matchCriteriaId": "E7A8F905-A4C6-4EC6-B9E8-800948350B89", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*", "matchCriteriaId": "565B48E3-1406-4E3C-B4A5-35865C5614E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*", "matchCriteriaId": "46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*", "matchCriteriaId": "8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*", "matchCriteriaId": "191A094B-E354-4767-AD43-87CE140BF851", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "matchCriteriaId": "C1289B9E-5725-42EF-8848-F545421A29E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*", "matchCriteriaId": "238A21CB-F8C5-468B-B523-6D014E2EA8AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*", "matchCriteriaId": "0DC52CDD-614D-4EA0-8DA8-D71189C42E8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*", "matchCriteriaId": "A3A630E1-6CAE-4809-AB18-5002F158AE90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*", "matchCriteriaId": "A67750FF-EF4B-414F-8ED4-299CAF33B0DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*", "matchCriteriaId": "5A82D885-82F5-4755-BC11-5899E28CEE42", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "matchCriteriaId": "88AF1366-8A14-4741-8146-886C31D8D347", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*", "matchCriteriaId": "7FD75301-E29C-47DC-B53F-DC44EA0C1885", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*", "matchCriteriaId": "8C944024-BEAA-43AF-A339-FD69C75E8240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*", "matchCriteriaId": "435C69D1-3932-4379-8D18-B1E12D558325", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*", "matchCriteriaId": "3572B700-73C0-41D1-95FD-FE9D5B0C1F80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*", "matchCriteriaId": "97A40DC9-0D4E-4C91-8D1B-3CED95B3952E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*", "matchCriteriaId": "16FB3E4B-05F8-411A-8C86-4ACE03815553", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*", "matchCriteriaId": "8E55EBC1-6F96-47CD-9503-7855EFB07240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*", "matchCriteriaId": "4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*", "matchCriteriaId": "F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*", "matchCriteriaId": "A1789924-FADB-4076-8874-120B29EE6B86", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*", "matchCriteriaId": "BC246667-2F6F-4024-9EAA-2CE3018235C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*", "matchCriteriaId": "B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*", "matchCriteriaId": "1341A5D4-A5CE-4D31-A178-01C3069D7A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*", "matchCriteriaId": "86A5C199-92E5-435C-AC40-175849285104", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*", "matchCriteriaId": "67589F54-0A54-4DE7-9A47-A73DD05F7965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*", "matchCriteriaId": "DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*", "matchCriteriaId": "8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*", "matchCriteriaId": "92C5DC8C-3318-440B-8B29-4827F343927B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*", "matchCriteriaId": "0ECC47D8-F602-4CEA-B19A-209CE76C9D36", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*", "matchCriteriaId": "7514ADD3-DECC-4CC2-9421-A609E526FDC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*", "matchCriteriaId": "691097C3-F91B-499B-BAEB-4E7E9C43B517", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*", "matchCriteriaId": "0B3DB1ED-017B-43EF-92A3-A8A88669FBC2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*", "matchCriteriaId": "19A49AAF-0F08-4151-8F74-4EF9C3415B00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "3F7A2018-BB4D-4DC1-813D-A4AA3F270893", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*", "matchCriteriaId": "A95D91C4-C539-4458-A6C9-8AE17207AE30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*", "matchCriteriaId": "37F9D218-8198-42C7-88FE-7C5382138324", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*", "matchCriteriaId": "CF8FDD81-95EE-4241-93C8-925085A4CE7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*", "matchCriteriaId": "614D9E35-10E0-4CCB-B817-C7C8C3947BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*", "matchCriteriaId": "F75F987E-F4DB-46FF-B048-21B4A4C07B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*", "matchCriteriaId": "05376F2C-30B6-406D-90F7-6C2E00E85171", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*", "matchCriteriaId": "CCDD3DF6-24BF-4C13-8F07-AF07327E5622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*", "matchCriteriaId": "B1520A64-2157-45D7-A135-F900798C4EB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*", "matchCriteriaId": "05A30F85-5367-4369-B7A5-176D71279FC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*", "matchCriteriaId": "B8803FF9-48D7-4AB0-8A17-4590CABD0BFD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*", "matchCriteriaId": "1DC63B6B-5D6D-477B-9125-007F835981B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*", "matchCriteriaId": "BF385AC9-963E-4670-95A6-BE1EBC3890B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*", "matchCriteriaId": "943FA088-2902-45A9-A1BA-D612B46A50D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*", "matchCriteriaId": "8C80902D-9A6C-47D4-B56F-35C378FC0E63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*", "matchCriteriaId": "1100B46C-8485-4048-BFF8-2BAB311EC04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*", "matchCriteriaId": "4B9E1646-E154-41BA-B9FA-0839A898023D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*", "matchCriteriaId": "03F4C8E6-0043-41A8-94EA-EEBAA1A081E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*", "matchCriteriaId": "31C10985-CBF7-4717-A7D6-2594887D7CB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*", "matchCriteriaId": "8C49886C-B6A0-4D95-8533-329FE5A66F6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*", "matchCriteriaId": "0788CF23-3FAF-44C9-9AAA-96E4818A1AEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*", "matchCriteriaId": "24AF7001-64D1-4BFB-9280-0BA0FAD97A0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*", "matchCriteriaId": "8C6E420E-16DA-4FB1-9968-C93E229614FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*", "matchCriteriaId": "07469E04-B3D2-41FE-A2E4-E25A977026CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*", "matchCriteriaId": "60FF402E-5E4F-414A-A3AB-149548303616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*", "matchCriteriaId": "79E2B875-A270-45C0-A1B1-041264E5B290", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*", "matchCriteriaId": "8C828C8C-7ECB-4167-87A9-0F522C400C66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*", "matchCriteriaId": "0C2C887F-1EF7-468A-A6AE-440793C78DAC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*", "matchCriteriaId": "6F2F3D7F-D884-4ACD-A103-060F57A9867B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*", "matchCriteriaId": "BD1FCAAD-7072-45EC-9ACB-08556458BAF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*", "matchCriteriaId": "C4446224-40E8-4AD0-8197-921D3473E19B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*", "matchCriteriaId": "4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*", "matchCriteriaId": "B92B68FD-771A-4401-8B1D-B1A252356F62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*", "matchCriteriaId": "1B933941-0BE3-4EEB-8FDD-2DAA63343EE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*", "matchCriteriaId": "8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*", "matchCriteriaId": "36F737C1-6011-42D2-9690-CA81EA0A283C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*", "matchCriteriaId": "19CA7EB6-D1C9-48D9-A69A-2618800A6CE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*", "matchCriteriaId": "0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*", "matchCriteriaId": "ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*", "matchCriteriaId": "56C909B0-8FB2-4220-AF93-EECB8D650CC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*", "matchCriteriaId": "FF36BAD0-A762-4F84-BE0B-060FE666ED67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*", "matchCriteriaId": "007337CD-94FB-4ED9-B4A3-9E0EC52D79B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*", "matchCriteriaId": "BCDFA137-F1FC-46BD-9872-D62671B1434D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*", "matchCriteriaId": "2E6DBCB3-E912-43A1-914B-5C7CCFAADE25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*", "matchCriteriaId": "0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*", "matchCriteriaId": "E2C67312-E128-4833-A91E-D7A9F96A7AD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*", "matchCriteriaId": "3F19F408-FABD-4A68-8CDC-C763F0321FB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*", "matchCriteriaId": "68A06EC2-E491-4CD5-9904-61A88EBB7FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*", "matchCriteriaId": "789A8CAE-8D9E-4244-880D-FBE28EC53AED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*", "matchCriteriaId": "F901EE11-D0C9-46F6-8316-D8F4F1D50260", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*", "matchCriteriaId": "E549F600-B9CE-4843-A772-2DACC528903E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*", "matchCriteriaId": "3F28E733-87ED-4610-A8EE-BD37BED7685B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2832E8BF-7AC7-444C-B297-66F770860571", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "44AA72FB-E78D-419E-AA82-B0538C6504D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "687C3BF3-D71A-49AD-8A05-EAC07CBCD949", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "90AF90D9-16C4-4F8A-9868-3E2823E3445C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "3C063C53-8970-45B1-85F8-FB2080BF4695", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "64596ED7-794A-4D23-987B-D9AD59D48EA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "A561A8E8-79E2-4071-B57D-590C22EF86A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "92E46658-60AB-4758-9236-3AC0E6464383", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "matchCriteriaId": "207B8FBA-E2FF-485A-9AD9-E604AE0FB903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "33F99640-C753-40BE-A0A1-4C2D92E7DB09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F98247B-1839-4676-855B-827A4B6C016B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDBA35BD-1048-4B6E-96B2-1CFF615EB49A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6CEEEE2-D6A2-4342-8A73-934093948824", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "979FEE9F-A957-43B6-BB6D-1A851D6FA11C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AF59D-D05E-47F9-B493-B5CD6781FDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF7EC93-0170-45A9-86C7-5460320B2AE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5F803AC-DCC7-43FC-BEB3-AA7984E0506C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "560993AA-299D-42B7-B77F-1BD0D2114CCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C582B1C-1DAC-48FD-82DD-7334C10A2175", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7862B0C-2C44-4110-A62A-083116129612", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "048C5996-F719-4338-B148-0DD1C13E02FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF7FB-AB5A-4549-8C15-E69458C649E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CEF6608-B650-4C77-9823-0AD57B3484F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BE6A2D7-901C-45F9-B487-D674047D522E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ADCB509-5B0E-4592-8B23-EC25A3F79D41", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB51691F-089F-4016-B25E-238074B06C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA37503-FD3D-4220-933C-234631D6EDEF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "matchCriteriaId": "72992831-2A76-456B-A80C-944BDD8591E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79C2131-5566-4CC2-B6ED-38E3F6964500", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "matchCriteriaId": "60BFDAA6-3DFC-4908-BC33-B05BAB462F94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6266056-770A-4E2D-A4FC-F1475257648E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "929AA8F3-8BDF-4614-9806-6D4231735616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "605D7552-8184-4B11-96FD-FE501A6C97DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3144BBDE-CC96-4408-AA02-ECC3BF902A34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B8BA77A-34E3-4B9E-822A-7B7A90D35790", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7165B43-ED22-4714-8FA4-1E201D1BFA69", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CFB133-FAF0-431A-9765-8A9738D6D87C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "matchCriteriaId": "2975B0F2-DB7C-4257-985A-482ED2725883", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "70221E07-3C2E-4A82-8259-AD583EB5CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "427DFD78-56CD-43C4-948E-F53AF9D669F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AD7649-3FEA-4971-9886-6C9312B937A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4EE972C-6BAE-4342-BA01-1D685487F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDFE3B-C064-49A9-BD43-3F7612257A74", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BD0EEC1-D695-41A5-8CD6-9E987A547CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF25B8-D474-4C6B-8E45-F57DDC7074E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DF18FD1-6670-4C3C-8000-A079C69D575E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "921EB5A5-F911-4FCE-A6F1-C66818B34678", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "023063E1-2DD7-487C-A8A7-939FAEE666A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "77255CE6-D7B7-4B48-993C-7100A1170BC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40AC368-3A14-4EFF-A8D0-7EFB4C83045D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C07E80D5-70A5-49C9-9044-D683C7ECCFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "63668AF4-F29C-4424-8EC5-2F0A5950DD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86616FE-0C3F-4984-A364-8A6A9F01DAD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C1C7CD-538D-4D7A-A81C-10DF5376A479", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5922F749-2B23-44B8-8A46-F31BCAEAD279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D75D0EEB-707C-4C86-A569-E91E9F00BA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FB0E20-0243-40A1-8DEF-37150791222E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "68CFF26D-8AD3-4179-9E4C-F06D7C858C9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7541572C-229F-4963-B7F0-06EB3323E53B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "matchCriteriaId": "85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "479F7C77-D16F-4E40-9026-3EB8422E0401", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DB08C8-0018-4A8E-A206-097BDDF83B08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7193E85-30BE-42D5-A26B-3F88817F3574", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "446E8515-45FC-4B8B-8D12-60643D64C07F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDF6B2-D388-4639-87D8-064AA3F6B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "00AAB8B6-B614-4EAA-BA90-C5326CB5D07A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A371DF9-E224-404F-99C2-C2A4607E62D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F40E356-365D-44B7-8C38-A0C89DDD6D3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3132029-89F8-4359-A0DC-A275785266A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02F5685-0636-48AB-B222-434CA1F3B336", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ED4693C-DECF-4434-90C0-56158F102E7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB408A6B-0842-43DA-9180-B0A299FCBCE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6215EBAC-7C75-4647-9970-482120897F1F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D1FD6E8-80EC-461F-9ED1-CE5912399E80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E96F585E-BDEF-45EE-B0AB-94FE23753AC5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3279C067-3058-4D46-A739-05404FD0E9B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "matchCriteriaId": "DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C0855225-F501-486A-BD03-2A86FD252B5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "matchCriteriaId": "214C7B0C-C438-4000-9F9B-6D83294243AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4C91AA2E-4BB2-49C8-9364-4E363DF42CB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DA26781F-5A1C-4DA5-835E-D984D697F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA4222-F25D-4457-80AA-6D05CA918D68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "matchCriteriaId": "9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "6777AC35-9D1F-4153-94AC-B25627D730E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "matchCriteriaId": "A5F063F4-8994-4E46-BA7B-A12A112009BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "matchCriteriaId": "4D6F2DE5-AF11-439A-8D37-30CB882ECD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E213DD86-5419-42C8-BF38-7795DDB3C582", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A972291E-5231-439D-873B-2F87BCAF800A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C089CC54-3229-43D7-AA15-73CFA1A43EE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "matchCriteriaId": "EF268D83-C15D-4559-A46F-844E1D9264F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CFE97C0D-3EA1-4314-A74A-7845C7778FB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "matchCriteriaId": "34293F29-F327-4ADD-BF62-78F63F79BB96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "matchCriteriaId": "528C0A46-1CC4-4882-985A-0BB41525BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "matchCriteriaId": "643F3522-A452-4927-944D-532574EC4243", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "matchCriteriaId": "58F40B78-4DBA-44EE-8420-086789EFF53D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "matchCriteriaId": "423BFD8F-4B50-43DA-9979-75FD18FBC953", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8BAD4A68-0481-476F-BBBD-3D515331368C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "matchCriteriaId": "838CEB7C-7C4C-416C-86CE-6E8DD47EF25B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "matchCriteriaId": "CC7D021F-3C97-45B3-B1F7-0AC26959F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4A31AEF3-448D-417B-9589-4BA0A06F2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F7A1D96F-7FFD-413F-ABCE-4530C3D63040", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "matchCriteriaId": "4B8343FE-1320-40AE-A37F-70EF1A4AC4B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD42BA5A-7DA0-409D-8685-E43CF9B61D9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A5FF80E9-CF28-4EF6-9CFE-4B500A434674", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "matchCriteriaId": "647B77A4-2F49-4989-AF43-961D69037370", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "matchCriteriaId": "805B1E33-F279-4303-9DF3-C81039A40C1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "matchCriteriaId": "B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7E0AAE-6539-4024-9055-BE0BAD702143", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7F1A8828-0765-4799-AD6C-143F45FAAD23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "matchCriteriaId": "12D34618-1CCA-405B-A49C-EB384A09C2C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "575D6061-66BC-4862-BC84-ECD82D436E2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "matchCriteriaId": "56B6EE64-1AD4-46B2-BA65-BB6282E56EB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "matchCriteriaId": "11650B45-0BDA-42BF-AEF3-83B48DD6A71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "matchCriteriaId": "BD3C92BA-827B-48AF-BBB3-FB60A9053C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "matchCriteriaId": "AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5EB44CA7-DFE6-4B1A-9A63-97AE30017E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4B305EFA-6226-412C-90EE-F0691F2DDDE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "matchCriteriaId": "7F3874FA-63CB-4B5D-8B64-CE920320A4E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "matchCriteriaId": "0800ED17-50E4-43F3-B46C-591DFA818BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "matchCriteriaId": "A46B0405-F301-4209-8766-6E12EAFAD157", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F99F9F1F-A967-4884-96CF-4488102DC0A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "matchCriteriaId": "DA9B37AD-4599-425B-B39F-E571F4975266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C5A5F1CF-A1E6-45F1-8B09-36566778DB57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "matchCriteriaId": "698C8A49-888B-4675-B3B0-25EDE2FD515E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "matchCriteriaId": "70D98F97-8EF4-48B5-84BE-C3CC27031FDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "matchCriteriaId": "B473D1FA-909B-492E-9C5B-94B0E20E1C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "matchCriteriaId": "BFD5EA7E-322E-4CE6-89D4-7DB1055C9034", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "matchCriteriaId": "67836379-4E1A-45CD-9506-7D3F612E47C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "matchCriteriaId": "5B1BBC61-8664-4452-93A7-DDB4D2E4C802", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "044F0375-DF2F-4D9B-AD7E-473D34165E8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "matchCriteriaId": "2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4A0655CA-A88C-4632-9A18-560E3F63B2F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "matchCriteriaId": "8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C6965851-3B29-4C21-9556-97FD731EAA85", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "matchCriteriaId": "52984FD2-44E0-4E91-B290-0376737EEF6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DF933366-7503-4F8D-B7AA-F6A16210EC37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4E2DAF5D-5BB7-49C6-8426-8B547505B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3EABB21D-D021-434B-B147-CAF687097A5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "matchCriteriaId": "7609424D-95F1-4493-A20C-B1BA4EC6439D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "matchCriteriaId": "966DC636-C802-4D9F-8162-652AFB931203", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A75794EB-A5AF-43F0-985F-D9E36F04C6D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "matchCriteriaId": "31C2CFF0-98FD-4A0D-8949-D554B2FE53D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "matchCriteriaId": "05F9217F-5028-4659-AA8E-F60548DE4D52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4AC769DC-CF2E-4A3C-A610-264F024E6279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "matchCriteriaId": "9B2B1CBF-D155-49BC-81A4-4172F177A5C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "370B2B32-519E-4373-8A04-5C5025D688BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "83D9B562-C279-4A55-A347-F28FC4F9CD12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "2A8C2BA0-48A8-4107-8681-A7C34C553D8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "B1B009DE-A82F-4569-9B42-EC1EC4DA8A40", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "683B6E83-37FF-4F9B-915F-059EBB29DB53", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E218718F-4BE6-48B0-A204-9DD4A932A654", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FB0AB327-B60A-473C-9D36-97766EE62D7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA249EE-4786-4E27-8787-5E8B88C2AEB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBD0529-1CF3-44E5-85B3-19A3323C9493", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D664EE97-07EC-410F-94C3-AEAB2C6A627D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "D31DB981-03B1-4A84-8D87-CD407C3C149F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CBD155D-89D9-4677-A621-4D7613BE65C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02BD0D4-FFFD-4355-97D8-170362F10B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6635781A-2651-4EF2-A5AC-AEEEE63FDE6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DCE6930-760A-48C0-B964-1E3ED6A8517C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E52DE90-DF96-4CE7-B8D1-226BA50E4D09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8EB40E7-9B91-4106-B303-2B70AF395BFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB0D5CD-8AF3-409D-96A7-718641D4B90D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E420B0B-0CD5-41C7-B25A-3DB856055F9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B0C295B-0D63-4BE7-830D-D927E00C301C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "matchCriteriaId": "605C340D-2220-4669-B827-9009CB099E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8791879D-2908-4F57-8DB3-6D24100A9108", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E823DC5B-98BE-4656-BFBF-3A7018F8F213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E8D558-ADE0-4358-9C76-7BD77BF23AA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7973B3D0-F244-4E26-88F5-A2D9BF2E4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "matchCriteriaId": "68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5CB567-4F86-4466-BE4D-BFF557ACAE0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A52611B-6583-4660-90D7-C9472728072B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E80C6E89-B57C-47BB-8B95-50C03DFB3B96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9AB685B-FEE1-41EF-A046-1B34619E12A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB9F6724-967A-4AF0-9896-12BF6164B2CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC1116BF-12D7-47CC-98DB-18B200CF9C16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FBB28DE-726B-4AF0-88A5-35987E1E648B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1880E2B8-5E0E-4603-8D17-3ABA43D28179", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FAFBB92-1917-4238-832B-195FBE418271", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "91DFDF3F-9A3F-42B8-99A1-A3F76B198358", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "matchCriteriaId": "8778F972-BF34-482F-9FA7-71A77F6138E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F288BB0-FE7A-4900-B227-BE80E4F4AADF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E16338-A094-4CA9-B77F-6FE42D3B422C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E07AB33-5351-487D-9602-495489C7C0B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "matchCriteriaId": "22115ED6-1707-4840-B0D1-AD36BC0C75A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C633BC-831F-4CB7-9D62-16693444B216", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD501E1-E78F-44C6-8A13-C29337B07EBE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "matchCriteriaId": "9085BA0B-B7E2-4908-90C0-B4183891C718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "matchCriteriaId": "81971C2F-137A-4F11-8C93-3B99D4CD1B58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E0BDAC-398E-406B-B2DB-AE049D6E98B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFDE6C-DE58-4C4D-882E-474EF6C3D934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "matchCriteriaId": "950C6BF9-AA47-4287-AC01-D183237490FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2355181D-D8EE-4F80-8280-13D5CBCF4779", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5209343F-66B0-4DC0-9111-E2E64CFF7409", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "720109A6-B79E-48E1-9AE7-7708B154788E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "82FF0DBD-AE13-4232-80F7-F4C2E2CC9721", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E944ED-8C02-46B8-BF95-0CE4C352753B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "matchCriteriaId": "77AEA3D1-4846-46E2-9B80-20B19F00DC11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1576978F-E93D-4A47-90B6-6A4E3A7DE558", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D339FE5-001F-4005-88A5-CFFE37F9B63E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BDABA86-497E-497E-A5BA-46F913A4840A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD886F4C-DB6F-4DDD-9807-8BCBB625C226", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4C454B7-E5F4-4AAE-B577-FD71FA002C8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "38BE2781-3A06-4D62-AC8B-68B721DA526B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DA23772-2EB8-4BEE-8703-26D967EC4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "72DC766A-B1F9-4B83-9F9B-CF603EE476BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA594740-43C5-4F42-BA5B-00CA8AE7BB60", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "572B16E2-8118-43A0-9A80-5D96831D55FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB5C551-BADC-4A3A-93E5-2EBCA0704C51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5383B7A3-1569-4FEB-B299-B87CE8C8A87B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A05BBDE0-6C47-4489-9455-7DA7D230ECA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "matchCriteriaId": "1789AA69-EA31-44D1-82E6-228E48E18586", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A7D5FF-3B1F-4C64-BB81-7A349765520D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F0498B3-393A-4C32-B338-E6014B956755", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C451F752-6869-4AFA-BAE5-5C9A54427BF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "83710FD1-099B-436D-9640-061D515E10BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "517B71CE-6156-40E1-B068-A2B733E205E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "11DEEEE5-5055-4CE1-962C-C5F075F4CC02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "matchCriteriaId": "8718DDAB-3208-48CF-9BCE-54DA1257C16A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1AA901-E822-4240-9D82-C9311E4F87B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1CDE3DF-8E79-4997-94EB-B517FFCAE55C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "12A0DE13-EB0B-493B-BC84-3AEB3D454776", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "matchCriteriaId": "1727697B-1F59-4E29-B036-C32E9076C523", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E69E827C-C0D0-46C7-913A-1C1E02CEAACE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2528F3F9-34DC-41DA-8926-382CB3EF5560", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E452C262-5A8D-4D97-BC7F-A4F5FF53A659", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D57BF69-D750-4278-98AA-976B0D28E347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "76ADAE30-6CAD-4F5B-B6F7-C18953144C63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A25D792-E21D-43EE-8B9D-67DE066DE5DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C669783-C058-4B4F-BB9A-84B2C4682247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "matchCriteriaId": "159B088B-9A85-4CAA-854A-AA080E528F95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBE74A94-FE8F-4749-A35A-AB7D57E24913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "990AC341-0E67-4A81-87E9-EE3EFD9E847E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BC18B0-58F1-4477-9978-CA7383C197FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "matchCriteriaId": "474992FB-842D-4661-A565-44AF2CD78693", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "476E1B79-5342-4895-96D7-E97DFC1F5334", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD318D5-89A6-4E28-939C-C5B61396806B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32C7E89-32ED-4328-9313-FA7D3DDBDC58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2792EED8-2CBD-478E-BC09-05FE830B3147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B1AF2F-6E48-4DBD-A60E-3088CA4C3771", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "matchCriteriaId": "34E1691D-65B3-45E4-A544-8B29E38D569D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "matchCriteriaId": "E42F2703-B8AB-410E-AF7B-CD0BE777F061", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "matchCriteriaId": "31244C94-00A3-499C-A91A-1BEF2FB0E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "matchCriteriaId": "878FF6E8-8A6D-44CE-9DD1-2C912AB8A193", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5078A95B-2BD8-4A37-A356-F53D1A53CB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "matchCriteriaId": "0BFE67CD-DE53-4C4E-8245-35902AEFA6E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "matchCriteriaId": "9F231D31-3AAD-4C5D-A225-D2DF94486718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5998DF5D-E785-45EC-B8D0-1F4EC4F96D50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "EADFD013-0BFB-427C-98E6-F9E4774DCBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "58620B10-FEA6-456D-B6B5-2745F5DBE82D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "matchCriteriaId": "E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4858A1F0-97F2-4258-AB98-027BF1EC5117", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3C961A8B-EAFD-4F66-9432-BCC0D154ECCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "matchCriteriaId": "052DE6CD-A1E7-4E81-B476-66EF451061C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "matchCriteriaId": "3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "matchCriteriaId": "751B3AC8-D45E-46B6-83D5-311B693F3C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "matchCriteriaId": "9588277A-0B97-4408-9CF7-11271CDAADD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "matchCriteriaId": "479FE854-85E5-4ED0-BFAF-2618C9053082", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "matchCriteriaId": "E048B9BF-77C8-49F7-9F2D-9999F79BA264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "matchCriteriaId": "6CD16D4D-E816-486D-96F4-5A2BF75B959F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "matchCriteriaId": "169C558E-1A83-47D5-A66B-035BD1DD56FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "matchCriteriaId": "D683E509-3FB2-4175-BCAB-4EB1B5C04958", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "matchCriteriaId": "6FCFA915-5445-4732-9F8F-D7561BA4177F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "63A9FD98-C22D-48F6-87A1-60791C818A1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "matchCriteriaId": "85F99F24-1783-4E6E-BE61-04C2E80356ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "matchCriteriaId": "74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "matchCriteriaId": "85289E4C-C813-4677-867D-EE8E98F4A1A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "matchCriteriaId": "27C8150F-BEFA-406D-9F0D-E7CB187E26AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "matchCriteriaId": "1E807F90-819F-4103-B1F7-4CE46971BD63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD93203F-71B9-4F87-B5D8-FD273451C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "1E652C74-C48D-4F29-9E85-09325632443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "99158191-3013-4182-8A53-5DFCA1E2C60A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "matchCriteriaId": "F7E39A3E-7EAE-47C9-930B-58A980B73FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "matchCriteriaId": "FFDA54BA-C00D-4890-9B7F-328257607B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "matchCriteriaId": "1F5EFB1E-334C-4B55-8E2E-6AE19B34774D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "B8260DCA-2F0C-45F7-B35F-D489AF5639F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "matchCriteriaId": "7778F81B-6D05-4666-B1D4-53DB0EC16858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "matchCriteriaId": "5DC6706A-61F7-4AA0-B2FF-0FFDF739A644", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7EF1B16B-02F2-4ECA-938E-B5CDCFC67816", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3C5501D8-1B0D-4F5A-AFD7-C63181D3281F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "matchCriteriaId": "1751F0CE-A0D3-40E2-8EEC-D31141FE33A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5FF9AFA7-BBE8-4229-94CB-5A9596728BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "matchCriteriaId": "E23A777F-68A4-4217-A75A-4D8A27E6451A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "matchCriteriaId": "2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "392A4337-11F6-4980-A138-4FDBCAD0EBA4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E2E9BB67-F1FF-4190-889F-78B965CCE934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "matchCriteriaId": "F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "35607317-0928-4297-A33E-D44BEE1BBEC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "matchCriteriaId": "D48323B1-7FEB-451F-A064-23E7CE7F6403", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "matchCriteriaId": "29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F5763189-7980-4A72-92C9-1908FE9E15EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "matchCriteriaId": "C53ACD49-DA21-4DDE-A0AA-FCCD59D29886", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4326D350-EBC2-48E6-A2C6-0499F6826CEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8594E6FE-B6DB-4343-B3DD-AEC19923DAF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5BCADA00-E453-414D-9933-FCB43D21BBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E62212D9-F707-4A8E-AB2A-A3985E7A4049", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "matchCriteriaId": "561755A8-8AAD-4F41-8266-747EFDAF2D55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "matchCriteriaId": "E6F4BB0F-DAF4-479B-B78A-7929C151AA1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "matchCriteriaId": "A207312E-1D35-4464-A111-22C4C793E146", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E9B16E32-07D5-445B-BAA5-4E4A0881BFC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7CF08F6B-2ECB-414C-82D7-C06085BF8B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "matchCriteriaId": "21032BE3-74D8-4C3F-B461-158F475B6853", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*", "matchCriteriaId": "F6E468FE-73BE-4B20-B774-58EC7CD20CDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*", "matchCriteriaId": "0FF6B19B-7D45-44B3-8524-407253B93EEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*", "matchCriteriaId": "2B803FAD-E54D-49FE-A078-029B8FFBBB98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*", "matchCriteriaId": "CC511505-ED67-45B4-B76C-56AB750C4408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*", "matchCriteriaId": "A430C232-79EB-4264-AE24-41D4A2A5D990", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*", "matchCriteriaId": "3A9E3D4B-A3DF-4858-8C64-0316B6E57435", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*", "matchCriteriaId": "19108672-E1AA-41CC-B86C-061D3721C8B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*", "matchCriteriaId": "200D36CF-AEDE-4183-8C54-748E6E5A3218", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*", "matchCriteriaId": "4CF13A44-5163-4282-8EE8-7DC05499B5E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*", "matchCriteriaId": "827C12CE-D87D-489D-ABA7-BE0405EC33D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*", "matchCriteriaId": "16AA78F7-520B-4FFC-838C-DC74FEE8E13F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a:8:*:*:*:*:*:*:*", "matchCriteriaId": "55E27011-7CEB-423B-A122-A0BFE563E884", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*", "matchCriteriaId": "A51E86F5-8F94-4E7C-9A63-DAA3FCBE0438", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:12:*:*:*:*:*:*:*", "matchCriteriaId": "1F2840B8-0E47-4003-9168-4AF94D7AB146", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*", "matchCriteriaId": "001AB619-157E-40B4-B86C-5DB18245D62F", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*", "matchCriteriaId": "1221FB4F-488A-4A52-8788-82ECBF92113B", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*", "matchCriteriaId": "38D51E27-28A3-47A1-9C36-1A223858E352", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*", "matchCriteriaId": "365DF3EF-E7D1-41FC-8382-D3B095542D59", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*", "matchCriteriaId": "D0B2B122-34A9-4534-A996-8FEAACA71A05", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*", "matchCriteriaId": "C850453B-CDB1-490D-B551-9AC0B27D8A67", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:76:*:*:*:*:*:*:*", "matchCriteriaId": "E46D6A37-5E4F-4DC0-BA02-6C9994FE1178", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-r:7:*:*:*:*:*:*:*", "matchCriteriaId": "01849B7E-AA70-4301-AECB-81167DC03675", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-r:8:*:*:*:*:*:*:*", "matchCriteriaId": "37960E0A-0D5B-4847-BD9C-E34C99FE7AAD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_eagle_application_processor:16.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C0B6815-6F8F-422D-8A9C-2C22691787FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_eagle_application_processor:16.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B63EF130-191C-47A1-9D54-0AB3159EB303", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*", "matchCriteriaId": "F361FE13-CB9B-4BBA-AB61-6EE2C5E9A6E5", "versionEndIncluding": "13.3", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8263DD50-D5F0-42BC-810E-A27155655154", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AD8D649-8F3E-4B22-912C-FE94CDC88A67", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "484B376F-23DA-4477-BFF5-174B9542E2DD", "versionEndExcluding": "xcp3090", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0CF40B-E5BD-4558-9321-184D58EF621D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2BDE31B-87D6-4DB8-BF36-AF35F5583A1D", "versionEndExcluding": "xcp3090", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F3C9C09-7B2B-4DB6-8BE0-35302ED35776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4507F493-1DA5-4F08-9D03-07E8961378B0", "versionEndExcluding": "xcp3090", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "95503CE5-1D06-4092-A60D-D310AADCAFB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis." }, { "lang": "es", "value": "Los sistemas con microprocesadores que emplean la ejecuci\u00f3n especulativa y la predicci\u00f3n de ramas podr\u00eda permitir la divulgaci\u00f3n no autorizada de informaci\u00f3n a un atacante con acceso de usuario local mediante un desbordamiento de b\u00fafer especulativo y el an\u00e1lisis de canal lateral." } ], "id": "CVE-2018-3693", "lastModified": "2024-11-21T04:05:53.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "[email protected]", "type": "Primary" } ] }, "published": "2018-07-10T21:29:01.340", "references": [ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1946" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0174" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180823-0001/" }, { "source": "[email protected]", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "[email protected]", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "[email protected]", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1946" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180823-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF71B61-A595-476B-B949-1A0FBDB360A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis." }, { "lang": "es", "value": "Los sistemas con microprocesadores que emplean la ejecuci\u00f3n especulativa y traducciones de direcciones podr\u00eda permitir la divulgaci\u00f3n no autorizada de informaci\u00f3n que reside en la cach\u00e9 de datos L1 a un atacante con acceso de usuario local mediante un error de p\u00e1gina del terminal y un an\u00e1lisis de canal lateral." } ], "id": "CVE-2018-3620", "lastModified": "2024-11-21T04:05:47.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "[email protected]", "type": "Primary" } ] }, "published": "2018-08-14T19:29:00.793", "references": [ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105080" }, { "source": "[email protected]", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041451" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0021.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "source": "[email protected]", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "source": "[email protected]", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "source": "[email protected]", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "source": "[email protected]", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "[email protected]", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://foreshadowattack.eu/" }, { "source": "[email protected]", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "[email protected]", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "source": "[email protected]", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "source": "[email protected]", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "source": "[email protected]", "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "source": "[email protected]", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K95275140" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3741-2/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "source": "[email protected]", "url": "https://usn.ubuntu.com/3823-1/" }, { "source": "[email protected]", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "source": "[email protected]", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "source": "[email protected]", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "source": "[email protected]", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "[email protected]", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://foreshadowattack.eu/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K95275140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3741-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3823-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "44AA72FB-E78D-419E-AA82-B0538C6504D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "687C3BF3-D71A-49AD-8A05-EAC07CBCD949", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "90AF90D9-16C4-4F8A-9868-3E2823E3445C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "3C063C53-8970-45B1-85F8-FB2080BF4695", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "64596ED7-794A-4D23-987B-D9AD59D48EA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "A561A8E8-79E2-4071-B57D-590C22EF86A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "92E46658-60AB-4758-9236-3AC0E6464383", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "matchCriteriaId": "207B8FBA-E2FF-485A-9AD9-E604AE0FB903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "33F99640-C753-40BE-A0A1-4C2D92E7DB09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF7EC93-0170-45A9-86C7-5460320B2AE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF7FB-AB5A-4549-8C15-E69458C649E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CEF6608-B650-4C77-9823-0AD57B3484F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79C2131-5566-4CC2-B6ED-38E3F6964500", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "605D7552-8184-4B11-96FD-FE501A6C97DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3144BBDE-CC96-4408-AA02-ECC3BF902A34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7165B43-ED22-4714-8FA4-1E201D1BFA69", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AD7649-3FEA-4971-9886-6C9312B937A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C07E80D5-70A5-49C9-9044-D683C7ECCFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D75D0EEB-707C-4C86-A569-E91E9F00BA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DB08C8-0018-4A8E-A206-097BDDF83B08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7193E85-30BE-42D5-A26B-3F88817F3574", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A371DF9-E224-404F-99C2-C2A4607E62D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6215EBAC-7C75-4647-9970-482120897F1F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D1FD6E8-80EC-461F-9ED1-CE5912399E80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E96F585E-BDEF-45EE-B0AB-94FE23753AC5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138p:*:*:*:*:*:*:*", "matchCriteriaId": "58A1B0AE-4816-41C1-B1BF-27915727B75C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180m:*:*:*:*:*:*:*", "matchCriteriaId": "6641329E-D171-4F78-9C13-C91A40A1DBA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:d-1513n:*:*:*:*:*:*:*", "matchCriteriaId": "A081FC36-5560-4BC7-B39A-EBC081AA894E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1518:*:*:*:*:*:*:*", "matchCriteriaId": "5525E2D1-19FA-4A77-BC0A-D00D2FE7E909", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1520:*:*:*:*:*:*:*", "matchCriteriaId": "D32D15EE-4994-4DEA-9DD1-138689973F1D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1521:*:*:*:*:*:*:*", "matchCriteriaId": "423C873B-E5C0-4E10-B743-35F90DD1B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1523n:*:*:*:*:*:*:*", "matchCriteriaId": "F1678F57-3024-4915-A113-B068A1A02066", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1527:*:*:*:*:*:*:*", "matchCriteriaId": "8C6B7AC8-028F-4F75-A7F2-CA444D13CE92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1528:*:*:*:*:*:*:*", "matchCriteriaId": "38E030EE-6370-41BD-94E2-075408368FF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1529:*:*:*:*:*:*:*", "matchCriteriaId": "11AD388E-1EEA-4D2C-B9A0-BB60734E7D86", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1531:*:*:*:*:*:*:*", "matchCriteriaId": "2A036068-43A3-4593-BB92-E643073F0934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1533n:*:*:*:*:*:*:*", "matchCriteriaId": "3F4C99BC-48C3-4926-B154-5925533D4145", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1537:*:*:*:*:*:*:*", "matchCriteriaId": "37C5C177-9088-4348-9A31-FF19D10622C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1539:*:*:*:*:*:*:*", "matchCriteriaId": "E720E1FB-C3C0-491D-8AF2-77375E0F4918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1540:*:*:*:*:*:*:*", "matchCriteriaId": "AF7A157A-D251-4F7A-B55C-5E47B9E24B8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1541:*:*:*:*:*:*:*", "matchCriteriaId": "3AE6B7F6-5772-4521-8908-CDC452FBBB35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1543n:*:*:*:*:*:*:*", "matchCriteriaId": "A1126F29-44F7-42A8-B41C-C3F24D802E84", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1548:*:*:*:*:*:*:*", "matchCriteriaId": "B17FEF9F-74A9-447B-8D0A-77F0040810B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1553n:*:*:*:*:*:*:*", "matchCriteriaId": "24EA8486-2B1B-4442-B36E-6291EB6701C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1557:*:*:*:*:*:*:*", "matchCriteriaId": "0F494BB6-7F47-4392-BAC8-F3AD5EF783FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1559:*:*:*:*:*:*:*", "matchCriteriaId": "22031D82-E917-4C8A-B005-AE49A0595FC8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1567:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF1896-2229-476B-9B49-B20A42446813", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1571:*:*:*:*:*:*:*", "matchCriteriaId": "98E173EB-B8E0-4A9C-9FCA-A224B93E4909", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-1577:*:*:*:*:*:*:*", "matchCriteriaId": "F35A34C3-03C7-48A6-8861-FFF85FD9D4EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2123it:*:*:*:*:*:*:*", "matchCriteriaId": "1DBA7220-0818-4751-ADFE-43BC66352BB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2141i:*:*:*:*:*:*:*", "matchCriteriaId": "3F463895-7B3D-403C-A16F-126FE5566AC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2142it:*:*:*:*:*:*:*", "matchCriteriaId": "E94698E1-1FF0-444B-BA7A-E588E5F94AB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2143it:*:*:*:*:*:*:*", "matchCriteriaId": "FD5D2BBC-A87C-4AE7-90D1-0AA5992F6EB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2145nt:*:*:*:*:*:*:*", "matchCriteriaId": "758630B1-9F38-4B06-A813-7466CD5ECB2D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2146nt:*:*:*:*:*:*:*", "matchCriteriaId": "5562A997-66C7-42C2-9D58-D49A206E0346", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2161i:*:*:*:*:*:*:*", "matchCriteriaId": "9FCC3F05-4BAB-4EE1-A805-BE5D06931CA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2163it:*:*:*:*:*:*:*", "matchCriteriaId": "469BB10E-AB66-4CC6-9574-62CBF46FEF64", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2166nt:*:*:*:*:*:*:*", "matchCriteriaId": "87E63464-B0BA-4F38-BF99-D26B5AAC202D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2173it:*:*:*:*:*:*:*", "matchCriteriaId": "D54FAE61-6692-4672-90DE-98EBC516992C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2177nt:*:*:*:*:*:*:*", "matchCriteriaId": "6E229EC4-BBA9-4A8F-B36C-4C8EFD7F9AFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2183it:*:*:*:*:*:*:*", "matchCriteriaId": "447A0BC8-129D-4EA0-A0FA-C3F4CCB8402A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:d-2187nt:*:*:*:*:*:*:*", "matchCriteriaId": "00A4818C-6588-4350-92F7-849C8AE8E144", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "matchCriteriaId": "CD028C10-FD07-4206-A732-CCAC1B6D043D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "matchCriteriaId": "704FAA50-1B7D-4917-AC4A-4C58785340F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "matchCriteriaId": "5C6B95D3-75BD-4826-BFBE-9701CC0FF052", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "matchCriteriaId": "F66E31A6-EA01-40C8-8718-CE2C1F45EEB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "matchCriteriaId": "DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "matchCriteriaId": "022F2CBE-EFB1-4962-AC91-D25AAB057DAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "matchCriteriaId": "69C05CD9-551B-46EE-85F8-D18FF878FE8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "matchCriteriaId": "2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "matchCriteriaId": "3C38C609-242E-4923-A81F-DAFBE7B6A927", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "matchCriteriaId": "A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "matchCriteriaId": "8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "matchCriteriaId": "D7AC7C56-2205-4121-99E2-001A7488E0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "matchCriteriaId": "A1677313-FF8F-493B-9DA3-C78F87581A17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "matchCriteriaId": "4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "matchCriteriaId": "85CA4444-5103-4451-8A7C-F6BBE714BBB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "matchCriteriaId": "FA1EB745-46D7-4088-93C6-E7156520B144", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "matchCriteriaId": "A93010C0-33B3-438F-94F6-8DA7A9D7B451", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3336:*:*:*:*:*:*:*", "matchCriteriaId": "66A06FDE-A91F-4078-83AB-4275543C042B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "matchCriteriaId": "2A988A78-6B3D-4599-A85C-42B4A294D86D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "matchCriteriaId": "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "matchCriteriaId": "246AA1B0-B6C8-406B-817D-26113DC63858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "matchCriteriaId": "00EE5B42-FF05-447C-BACC-0E650E773E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "matchCriteriaId": "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "matchCriteriaId": "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "matchCriteriaId": "5D616C72-0863-478C-9E87-3963C83B87E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "matchCriteriaId": "CC333B0D-3A0E-4629-8016-68C060343874", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "matchCriteriaId": "6655535C-FF64-4F9E-8168-253AABCC4F5D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "matchCriteriaId": "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "matchCriteriaId": "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "matchCriteriaId": "1EACEF19-83BC-4579-9274-BE367F914432", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "matchCriteriaId": "24128A7F-2B0B-4923-BA9E-9F5093D29423", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces." }, { "lang": "es", "value": "Las restricciones de configuraci\u00f3n UEFI existentes para DCI (Direct Connect Interface) en la familia E3 de procesadores Intel Xeon de 5\u00aa y 6\u00aa generaci\u00f3n, los procesadores Intel Xeon Scalable y la familia D de procesadores Intel Xeon permiten que un atacante con presencia f\u00edsica limitada acceda potencialmente a los secretos de la plataforma mediante las interfaces de depuraci\u00f3n." } ], "id": "CVE-2018-3652", "lastModified": "2024-11-21T04:05:50.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 6.0, "source": "[email protected]", "type": "Primary" } ] }, "published": "2018-07-10T21:29:00.983", "references": [ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180802-0001/" }, { "source": "[email protected]", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180802-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "[email protected]", "type": "Primary" } ] }
cve-2021-33107
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx |
Version: before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:19.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-33107", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:21:30.620276Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-05T16:50:44.562Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access." } ], "problemTypes": [ { "descriptions": [ { "description": " information disclosure ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T19:06:10.000Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2021-33107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx", "version": { "version_data": [ { "version_value": "before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " information disclosure " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2021-33107", "datePublished": "2022-02-09T22:04:36.000Z", "dateReserved": "2021-05-18T00:00:00.000Z", "dateUpdated": "2025-05-05T16:50:44.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3620
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Multiple |
Version: Multiple |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:29.256Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#982149", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "1041451", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041451" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3741-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2393", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "USN-3823-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "RHSA-2018:2389", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "RHSA-2018:2390", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2403", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "105080", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105080" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3740-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "FreeBSD-SA-18:09", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "DSA-4274", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "FEDORA-2018-1c80fea1cd", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "RHSA-2018:2388", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "USN-3741-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2603", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2402", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "FEDORA-2018-f8cba144ae", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "USN-3742-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "RHSA-2018:2404", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "USN-3740-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "RHSA-2018:2391", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2396", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "DSA-4279", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "RHSA-2018:2392", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "USN-3742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2602", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2387", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://foreshadowattack.eu/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K95275140" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Multiple", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple" } ] } ], "datePublic": "2018-08-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-15T02:22:58", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "VU#982149", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "1041451", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041451" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3741-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2393", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "USN-3823-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "RHSA-2018:2389", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "RHSA-2018:2390", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2403", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "105080", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105080" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3740-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "FreeBSD-SA-18:09", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "DSA-4274", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "FEDORA-2018-1c80fea1cd", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "RHSA-2018:2388", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "USN-3741-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2603", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2402", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "FEDORA-2018-f8cba144ae", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "USN-3742-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "RHSA-2018:2404", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "USN-3740-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "RHSA-2018:2391", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2396", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "DSA-4279", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "RHSA-2018:2392", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "USN-3742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2602", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2387", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://foreshadowattack.eu/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K95275140" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "DATE_PUBLIC": "2018-08-14T00:00:00", "ID": "CVE-2018-3620", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Multiple", "version": { "version_data": [ { "version_value": "Multiple" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "VU#982149", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "1041451", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041451" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3741-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2393", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "USN-3823-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "RHSA-2018:2389", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "RHSA-2018:2390", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2403", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "105080", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105080" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3740-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "FreeBSD-SA-18:09", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "DSA-4274", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "FEDORA-2018-1c80fea1cd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "RHSA-2018:2388", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "USN-3741-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2603", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2402", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "FEDORA-2018-f8cba144ae", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "USN-3742-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "RHSA-2018:2404", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "USN-3740-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "RHSA-2018:2391", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2396", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "DSA-4279", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "RHSA-2018:2392", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "USN-3742-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2602", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2387", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "http://xenbits.xen.org/xsa/advisory-273.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "name": "https://foreshadowattack.eu/", "refsource": "MISC", "url": "https://foreshadowattack.eu/" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2018-0021.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2018-0021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180815-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "name": "https://support.f5.com/csp/article/K95275140", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K95275140" }, { "name": "http://support.lenovo.com/us/en/solutions/LEN-24163", "refsource": "CONFIRM", "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_45", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "name": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "refsource": "CONFIRM", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3620", "datePublished": "2018-08-14T19:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-17T01:01:22.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3652
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20180802-0001/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel Xeon Processor |
Version: 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.453Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180802-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Xeon Processor", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family" } ] } ], "datePublic": "2018-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces." } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure, Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-03T09:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180802-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2018-3652", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Xeon Processor", "version": { "version_data": [ { "version_value": "5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information disclosure, Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20180802-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180802-0001/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3652", "datePublished": "2018-07-10T21:00:00", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-08-05T04:50:30.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3632
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1041362 | vdb-entry, x_refsource_SECTRACK | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190327-0001/ | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel Active Management Technology |
Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } ], "datePublic": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-27T18:06:09", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2018-3632", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Active Management Technology", "version": { "version_data": [ { "version_value": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "1041362", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041362" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20190327-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3632", "datePublished": "2018-07-10T21:00:00", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-08-05T04:50:30.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5754
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Most Modern Operating Systems |
Version: All |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "USN-3523-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3523-1/" }, { "name": "USN-3525-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/usn/usn-3525-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "DSA-4082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4082" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX234679" }, { "name": "USN-3540-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "name": "USN-3522-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3522-3/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "name": "[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "SUSE-SU-2018:0012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "DSA-4120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4120" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "USN-3524-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/usn/usn-3524-2/" }, { "name": "DSA-4078", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4078" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2018-04-01" }, { "name": "openSUSE-SU-2018:0022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "RHSA-2018:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "USN-3522-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/usn/usn-3522-2/" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "USN-3583-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3583-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX231399" }, { "name": "102378", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102378" }, { "name": "FreeBSD-SA-18:03", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "106128", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "USN-3597-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3523-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/usn/usn-3523-2/" }, { "name": "USN-3516-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "name": "USN-3541-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://meltdownattack.com/" }, { "name": "openSUSE-SU-2018:0023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "USN-3522-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3522-4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685358" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Most Modern Operating Systems", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "All" } ] } ], "datePublic": "2018-01-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-19T17:54:02", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "USN-3523-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3523-1/" }, { "name": "USN-3525-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/usn/usn-3525-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "DSA-4082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4082" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX234679" }, { "name": "USN-3540-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "name": "USN-3522-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3522-3/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "name": "[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "SUSE-SU-2018:0012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "DSA-4120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4120" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "USN-3524-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/usn/usn-3524-2/" }, { "name": "DSA-4078", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4078" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2018-04-01" }, { "name": "openSUSE-SU-2018:0022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "RHSA-2018:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "USN-3522-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/usn/usn-3522-2/" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "USN-3583-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3583-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX231399" }, { "name": "102378", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102378" }, { "name": "FreeBSD-SA-18:03", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "106128", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "USN-3597-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3523-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/usn/usn-3523-2/" }, { "name": "USN-3516-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "name": "USN-3541-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "tags": [ "x_refsource_MISC" ], "url": "https://meltdownattack.com/" }, { "name": "openSUSE-SU-2018:0023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "USN-3522-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3522-4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685358" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "DATE_PUBLIC": "2018-01-03T00:00:00", "ID": "CVE-2017-5754", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Most Modern Operating Systems", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "USN-3523-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3523-1/" }, { "name": "USN-3525-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-3525-1/" }, { "name": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin", "refsource": "CONFIRM", "url": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "DSA-4082", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4082" }, { "name": "https://support.citrix.com/article/CTX234679", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX234679" }, { "name": "USN-3540-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3540-2/" }, { "name": "USN-3522-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3522-3/" }, { "name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "name": "[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "SUSE-SU-2018:0012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "refsource": "MISC", "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-002", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "DSA-4120", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4120" }, { "name": "https://support.f5.com/csp/article/K91229003", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "USN-3524-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-3524-2/" }, { "name": "DSA-4078", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4078" }, { "name": "https://source.android.com/security/bulletin/2018-04-01", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2018-04-01" }, { "name": "openSUSE-SU-2018:0022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "RHSA-2018:0292", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "name": "http://xenbits.xen.org/xsa/advisory-254.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180104-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_01", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "refsource": "CONFIRM", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "USN-3522-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-3522-2/" }, { "name": "VU#180049", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "USN-3583-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3583-1/" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-003", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001", "refsource": "CONFIRM", "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "refsource": "CONFIRM", "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "name": "https://support.citrix.com/article/CTX231399", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX231399" }, { "name": "102378", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102378" }, { "name": "FreeBSD-SA-18:03", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "refsource": "CONFIRM", "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "106128", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106128" }, { "name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "refsource": "CONFIRM", "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040071" }, { "name": "USN-3597-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-2/" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3523-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-3523-2/" }, { "name": "USN-3516-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "name": "USN-3541-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "refsource": "MISC", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "name": "https://support.lenovo.com/us/en/solutions/LEN-18282", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "https://meltdownattack.com/", "refsource": "MISC", "url": "https://meltdownattack.com/" }, { "name": "openSUSE-SU-2018:0023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "USN-3522-4", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3522-4/" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "https://cdrdv2.intel.com/v1/dl/getContent/685358", "refsource": "CONFIRM", "url": "https://cdrdv2.intel.com/v1/dl/getContent/685358" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5754", "datePublished": "2018-01-04T13:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T16:48:54.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5715
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Microprocessors with Speculative Execution |
Version: All |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "USN-3560-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3560-1/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "USN-3540-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" }, { "name": "USN-3597-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "name": "DSA-4213", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4213" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "DSA-4120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4120" }, { "name": "openSUSE-SU-2018:0013", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" }, { "name": "USN-3580-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "USN-3531-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3531-3/" }, { "name": "USN-3620-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3620-2/" }, { "name": "openSUSE-SU-2018:0022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "USN-3582-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3582-1/" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "name": "SUSE-SU-2018:0019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "102376", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102376" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "USN-3594-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3594-1/" }, { "name": "VU#584653", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "SUSE-SU-2018:0009", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" }, { "name": "USN-3690-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3690-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html" }, { "name": "USN-3549-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "name": "SUSE-SU-2018:0007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX231399" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://spectreattack.com/" }, { "name": "USN-3531-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3531-1/" }, { "name": "FreeBSD-SA-18:03", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "SUSE-SU-2018:0006", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" }, { "name": "USN-3581-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3581-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr" }, { "name": "USN-3597-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "name": "USN-3581-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3581-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "SUSE-SU-2018:0020", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" }, { "name": "USN-3541-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "USN-3777-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3777-3/" }, { "name": "openSUSE-SU-2018:0023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html" }, { "name": "SUSE-SU-2018:0008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "USN-3561-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3561-1/" }, { "name": "USN-3582-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3582-2/" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "FreeBSD-SA-19:26", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc" }, { "name": "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Nov/16" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2017-5715" }, { "name": "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html" }, { "name": "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2017-5715", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:31:09.657900Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203 Observable Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T14:59:36.405Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Microprocessors with Speculative Execution", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "All" } ] } ], "datePublic": "2018-01-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-16T08:06:27.000Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "USN-3560-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3560-1/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "USN-3540-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" }, { "name": "USN-3597-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "name": "DSA-4213", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4213" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "DSA-4120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4120" }, { "name": "openSUSE-SU-2018:0013", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" }, { "name": "USN-3580-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "USN-3531-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3531-3/" }, { "name": "USN-3620-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3620-2/" }, { "name": "openSUSE-SU-2018:0022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "USN-3582-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3582-1/" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "name": "SUSE-SU-2018:0019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "102376", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102376" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "USN-3594-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3594-1/" }, { "name": "VU#584653", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "SUSE-SU-2018:0009", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" }, { "name": "USN-3690-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3690-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html" }, { "name": "USN-3549-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "name": "SUSE-SU-2018:0007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX231399" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://spectreattack.com/" }, { "name": "USN-3531-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3531-1/" }, { "name": "FreeBSD-SA-18:03", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "SUSE-SU-2018:0006", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" }, { "name": "USN-3581-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3581-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr" }, { "name": "USN-3597-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "name": "USN-3581-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3581-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "SUSE-SU-2018:0020", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" }, { "name": "USN-3541-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "USN-3777-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3777-3/" }, { "name": "openSUSE-SU-2018:0023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html" }, { "name": "SUSE-SU-2018:0008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "USN-3561-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3561-1/" }, { "name": "USN-3582-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3582-2/" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "FreeBSD-SA-19:26", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc" }, { "name": "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Nov/16" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2017-5715" }, { "name": "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html" }, { "name": "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "DATE_PUBLIC": "2018-01-03T00:00:00", "ID": "CVE-2017-5715", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Microprocessors with Speculative Execution", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "USN-3560-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3560-1/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "USN-3540-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3540-2/" }, { "name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" }, { "name": "USN-3597-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "refsource": "MISC", "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "name": "DSA-4213", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4213" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-002", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "DSA-4120", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4120" }, { "name": "openSUSE-SU-2018:0013", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" }, { "name": "USN-3580-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3580-1/" }, { "name": "https://support.f5.com/csp/article/K91229003", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "USN-3531-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3531-3/" }, { "name": "USN-3620-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3620-2/" }, { "name": "openSUSE-SU-2018:0022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "USN-3582-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3582-1/" }, { "name": "DSA-4188", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "name": "http://xenbits.xen.org/xsa/advisory-254.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180104-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "name": "SUSE-SU-2018:0019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_01", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "102376", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102376" }, { "name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "refsource": "CONFIRM", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "USN-3594-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3594-1/" }, { "name": "VU#584653", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-003", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "SUSE-SU-2018:0009", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" }, { "name": "USN-3690-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3690-1/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001", "refsource": "CONFIRM", "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html" }, { "name": "USN-3549-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3549-1/" }, { "name": "SUSE-SU-2018:0007", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" }, { "name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "refsource": "CONFIRM", "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "name": "https://support.citrix.com/article/CTX231399", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX231399" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "https://spectreattack.com/", "refsource": "MISC", "url": "https://spectreattack.com/" }, { "name": "USN-3531-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3531-1/" }, { "name": "FreeBSD-SA-18:03", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "refsource": "CONFIRM", "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "SUSE-SU-2018:0006", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" }, { "name": "USN-3581-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3581-1/" }, { "name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "refsource": "CONFIRM", "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040071" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr" }, { "name": "USN-3597-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-2/" }, { "name": "USN-3581-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3581-2/" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "SUSE-SU-2018:0020", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" }, { "name": "USN-3541-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "refsource": "MISC", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "name": "https://support.lenovo.com/us/en/solutions/LEN-18282", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "USN-3777-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3777-3/" }, { "name": "openSUSE-SU-2018:0023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html" }, { "name": "SUSE-SU-2018:0008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "USN-3561-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3561-1/" }, { "name": "USN-3582-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3582-2/" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "FreeBSD-SA-19:26", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc" }, { "name": "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Nov/16" }, { "name": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html" }, { "name": "https://security.paloaltonetworks.com/CVE-2017-5715", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2017-5715" }, { "name": "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html" }, { "name": "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5715", "datePublished": "2018-01-04T13:00:00.000Z", "dateReserved": "2017-02-01T00:00:00.000Z", "dateUpdated": "2025-05-06T14:59:36.405Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-9056
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:10:47.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-27T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2018-9056", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf", "refsource": "MISC", "url": "http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf" }, { "name": "https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/", "refsource": "MISC", "url": "https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-9056", "datePublished": "2018-03-27T17:00:00", "dateReserved": "2018-03-27T00:00:00", "dateUpdated": "2024-08-05T07:10:47.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5753
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Most Modern Operating Systems |
Version: All |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3540-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "USN-3580-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "openSUSE-SU-2018:0022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "USN-3549-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX231399" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://spectreattack.com/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "102371", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102371" }, { "name": "USN-3597-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "USN-3540-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "USN-3541-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3541-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3542-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "openSUSE-SU-2018:0023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Most Modern Operating Systems", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "All" } ] } ], "datePublic": "2018-01-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-19T17:48:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3540-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "USN-3580-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "openSUSE-SU-2018:0022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "USN-3549-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX231399" }, { "tags": [ "x_refsource_MISC" ], "url": "https://spectreattack.com/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "102371", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102371" }, { "name": "USN-3597-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "USN-3540-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "USN-3541-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3541-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3542-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "openSUSE-SU-2018:0023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "DATE_PUBLIC": "2018-01-03T00:00:00", "ID": "CVE-2017-5753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Most Modern Operating Systems", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3540-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3540-2/" }, { "name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "refsource": "MISC", "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-002", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "USN-3580-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3580-1/" }, { "name": "https://support.f5.com/csp/article/K91229003", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "openSUSE-SU-2018:0022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "DSA-4188", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "name": "http://xenbits.xen.org/xsa/advisory-254.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180104-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_01", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "refsource": "CONFIRM", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-003", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001", "refsource": "CONFIRM", "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "USN-3549-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3549-1/" }, { "name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "refsource": "CONFIRM", "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "name": "https://support.citrix.com/article/CTX231399", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX231399" }, { "name": "https://spectreattack.com/", "refsource": "MISC", "url": "https://spectreattack.com/" }, { "name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "refsource": "CONFIRM", "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "refsource": "CONFIRM", "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040071" }, { "name": "102371", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102371" }, { "name": "USN-3597-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-2/" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "USN-3540-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "USN-3541-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3541-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3542-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3542-1/" }, { "name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "refsource": "MISC", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "name": "https://support.lenovo.com/us/en/solutions/LEN-18282", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "openSUSE-SU-2018:0023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://cdrdv2.intel.com/v1/dl/getContent/685359", "refsource": "CONFIRM", "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5753", "datePublished": "2018-01-04T13:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T22:24:53.960Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3628
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1041362 | vdb-entry, x_refsource_SECTRACK | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190327-0001/ | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel Active Management Technology |
Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } ], "datePublic": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-27T18:06:08", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2018-3628", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Active Management Technology", "version": { "version_data": [ { "version_value": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "1041362", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041362" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20190327-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3628", "datePublished": "2018-07-10T21:00:00", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-08-05T04:50:30.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3646
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Multiple |
Version: Multiple |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#982149", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "1041451", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041451" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3741-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2393", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "USN-3823-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "RHSA-2018:2389", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "1042004", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2018:2390", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2403", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "105080", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105080" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3740-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "FreeBSD-SA-18:09", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "DSA-4274", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "FEDORA-2018-1c80fea1cd", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "RHSA-2018:2388", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "USN-3741-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2603", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2402", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "FEDORA-2018-f8cba144ae", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "USN-3742-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "RHSA-2018:2404", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "USN-3740-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "RHSA-2018:2391", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2396", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "DSA-4279", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "RHSA-2018:2392", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "USN-3742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2602", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2387", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "USN-3756-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3756-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://foreshadowattack.eu/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K31300402" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Multiple", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple" } ] } ], "datePublic": "2018-08-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-15T02:22:59", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "VU#982149", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "1041451", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041451" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3741-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2393", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "USN-3823-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "RHSA-2018:2389", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "1042004", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2018:2390", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2403", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "105080", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105080" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3740-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "FreeBSD-SA-18:09", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "DSA-4274", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "FEDORA-2018-1c80fea1cd", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "RHSA-2018:2388", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "USN-3741-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2603", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2402", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "FEDORA-2018-f8cba144ae", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "USN-3742-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "RHSA-2018:2404", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "USN-3740-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "RHSA-2018:2391", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2396", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "DSA-4279", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "RHSA-2018:2392", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "USN-3742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2602", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2387", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "USN-3756-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3756-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://foreshadowattack.eu/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K31300402" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "DATE_PUBLIC": "2018-08-14T00:00:00", "ID": "CVE-2018-3646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Multiple", "version": { "version_data": [ { "version_value": "Multiple" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "VU#982149", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "1041451", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041451" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3741-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2393", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "USN-3823-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "RHSA-2018:2389", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "1042004", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2018:2390", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2403", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "105080", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105080" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3740-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "FreeBSD-SA-18:09", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "DSA-4274", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "FEDORA-2018-1c80fea1cd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "RHSA-2018:2388", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "USN-3741-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2603", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2402", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "FEDORA-2018-f8cba144ae", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "USN-3742-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "RHSA-2018:2404", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "USN-3740-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "RHSA-2018:2391", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2396", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "DSA-4279", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "RHSA-2018:2392", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "USN-3742-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2602", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2387", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "USN-3756-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3756-1/" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "http://xenbits.xen.org/xsa/advisory-273.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "name": "https://foreshadowattack.eu/", "refsource": "MISC", "url": "https://foreshadowattack.eu/" }, { "name": "https://security.netapp.com/advisory/ntap-20180815-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "name": "http://support.lenovo.com/us/en/solutions/LEN-24163", "refsource": "CONFIRM", "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_45", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "name": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "refsource": "CONFIRM", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "name": "https://support.f5.com/csp/article/K31300402", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K31300402" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3646", "datePublished": "2018-08-14T19:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-17T02:27:21.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3693
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Most Modern Operating Systems |
Version: All |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.557Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:2390", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "RHSA-2019:1946", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1946" }, { "name": "RHSA-2020:0174", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0174" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180823-0001/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Most Modern Operating Systems", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "All" } ] } ], "datePublic": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-19T17:51:16", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "RHSA-2018:2390", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "RHSA-2019:1946", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1946" }, { "name": "RHSA-2020:0174", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0174" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180823-0001/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2018-3693", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Most Modern Operating Systems", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:2390", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "RHSA-2019:1946", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1946" }, { "name": "RHSA-2020:0174", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0174" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://security.netapp.com/advisory/ntap-20180823-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180823-0001/" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://cdrdv2.intel.com/v1/dl/getContent/685359", "refsource": "CONFIRM", "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3693", "datePublished": "2018-07-10T21:00:00", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-08-05T04:50:30.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3629
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1041362 | vdb-entry, x_refsource_SECTRACK | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190327-0001/ | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel Active Management Technology |
Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } ], "datePublic": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-27T18:06:09", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2018-3629", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Active Management Technology", "version": { "version_data": [ { "version_value": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "1041362", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041362" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20190327-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3629", "datePublished": "2018-07-10T21:00:00", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-08-05T04:50:30.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }