CVE-2019-11139
Vulnerability from cvelistv5
Published
2019-11-14 18:18
Modified
2024-08-04 22:48
Severity ?
Summary
Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
References
secure@intel.comhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.htmlMailing List, Third Party Advisory
secure@intel.comhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.htmlMailing List, Third Party Advisory
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2019/12/msg00035.htmlMailing List, Third Party Advisory
secure@intel.comhttps://seclists.org/bugtraq/2019/Dec/28Mailing List, Third Party Advisory
secure@intel.comhttps://support.f5.com/csp/article/K42433061?utm_source=f5support&amp%3Butm_medium=RSS
secure@intel.comhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_usThird Party Advisory
secure@intel.comhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/12/msg00035.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Dec/28Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.f5.com/csp/article/K42433061?utm_source=f5support&amp%3Butm_medium=RSS
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.htmlVendor Advisory
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.917Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
          },
          {
            "name": "openSUSE-SU-2019:2527",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html"
          },
          {
            "name": "openSUSE-SU-2019:2528",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03969en_us"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.f5.com/csp/article/K42433061?utm_source=f5support\u0026amp%3Butm_medium=RSS"
          },
          {
            "name": "20191216 [SECURITY] [DSA 4565-2] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "https://seclists.org/bugtraq/2019/Dec/28"
          },
          {
            "name": "[debian-lts-announce] 20191230 [SECURITY] [DLA 2051-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "2019.2 IPU \u2013 Intel(R) Xeon(R) Scalable Processors Voltage Setting Modulation",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-31T00:06:32",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
        },
        {
          "name": "openSUSE-SU-2019:2527",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html"
        },
        {
          "name": "openSUSE-SU-2019:2528",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03969en_us"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.f5.com/csp/article/K42433061?utm_source=f5support\u0026amp%3Butm_medium=RSS"
        },
        {
          "name": "20191216 [SECURITY] [DSA 4565-2] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "https://seclists.org/bugtraq/2019/Dec/28"
        },
        {
          "name": "[debian-lts-announce] 20191230 [SECURITY] [DLA 2051-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11139",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "2019.2 IPU \u2013 Intel(R) Xeon(R) Scalable Processors Voltage Setting Modulation",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
            },
            {
              "name": "openSUSE-SU-2019:2527",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html"
            },
            {
              "name": "openSUSE-SU-2019:2528",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03969en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03969en_us"
            },
            {
              "name": "https://support.f5.com/csp/article/K42433061?utm_source=f5support\u0026amp;utm_medium=RSS",
              "refsource": "CONFIRM",
              "url": "https://support.f5.com/csp/article/K42433061?utm_source=f5support\u0026amp;utm_medium=RSS"
            },
            {
              "name": "20191216 [SECURITY] [DSA 4565-2] intel-microcode security update",
              "refsource": "BUGTRAQ",
              "url": "https://seclists.org/bugtraq/2019/Dec/28"
            },
            {
              "name": "[debian-lts-announce] 20191230 [SECURITY] [DLA 2051-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11139",
    "datePublished": "2019-11-14T18:18:56",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.917Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-11139\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2019-11-14T19:15:13.190\",\"lastModified\":\"2024-11-21T04:20:36.767\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.\"},{\"lang\":\"es\",\"value\":\"Una comprobaci\u00f3n de condiciones inapropiadas en la interfaz de modulaci\u00f3n de voltaje para algunos Intel\u00ae Xeon\u00ae Scalable Processors, puede habilitar a un usuario privilegiado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8153_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2DFB869-33F8-4459-95CE-04555196776C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8153:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D6EBCF2-2DF1-41B8-BA7E-3B576CB653E9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8156_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2219666-0265-4791-B2E0-0F65B526915A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8156:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D922C72-5646-4BC9-8554-C350BC489FA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8158_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66D94CC9-23D3-4FB7-85EA-FB44EE4DA205\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8158:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B553518-4B86-4876-84BE-4C77769DA233\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8160_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39968F90-2D2F-418B-A8A4-BE992DEC1561\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D419FED8-FB40-40CE-82BA-A5D79DEB5A02\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8160f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8903A604-1176-45B9-B967-65624E3A6507\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8160f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0F30B1-3873-4120-8A73-3F93350745BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8160m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC4F99BB-52FB-4D1D-B783-F33A7CF99425\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8160m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28BCE14-2F61-4FF5-B3B9-AF60A08D89E0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8160t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81284EE2-526F-42C5-96DB-0DA222C4CCE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8160t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21801FEA-5B52-4297-917C-2BA0EDDF57E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8164_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB9A22A2-CF28-46EE-992B-42D5142877BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8164:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3931109-5AFA-4C11-9A4A-BC0E2C208E96\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8168_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D56EAAC-499C-4E5F-895E-3CCC0EBD25C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8168:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54F9A665-FB0F-4CEB-B3A7-5AEE55EBB676\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8170_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85FA027A-93B1-4C10-9DAB-16C6BED90D29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8170:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE76F51B-8C7D-42D0-BD4F-AD2C2E8EA0A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8170m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4FDA8F4-77B6-4E0A-9891-B323EAEB1A29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8170m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1941CFA-881E-4863-8E13-49459EF4B6DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8176_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E42B923-8CE9-4669-8AD9-62733DEA6F70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8176:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5613DF64-FF2F-4A47-BAE0-D2A8152036DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8176f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35696FDE-A146-437B-A8F8-E23A656FD5FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8176f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A81E98EA-6E25-44A4-A721-8E867DACC5EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8176m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6A429F5-4EED-468D-95A6-BC81AAB707EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8176m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CFBF5AC-88B4-4BE4-AA5F-950A4A62D89D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8180_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F487028-015D-4BCC-A639-F2DED35FD467\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8180:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D28D96F-67C3-4DAD-9A8A-AA0641B43744\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_8180m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A67280-25D1-43F0-8CF2-C6C90A312208\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_8180m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A36C0B5-0792-4895-A2E1-5FBB72E5FD76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5115_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1609E1C0-7A46-4941-996E-5631A8A50B7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5115:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F88FF7-A45D-4B08-B3D0-B9D6D2CFBAE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5118_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DEB7879-90E3-43E8-8B31-34A1245AC25C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5118:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7EAF827-76FF-45FF-811B-C26129361DF5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5119t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D689D4C6-FB59-4759-9A08-B18238B99C6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5119t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CC08EC7-31FC-4A31-BC63-0CDAE900DD4D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5120_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B6B2817-3923-4614-8ACD-2570DF3936B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31ACA3B7-70AF-4085-A80B-1154AB636EE5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5120t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAD02B5E-7798-4505-B8E3-E1CEEB8C1845\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5120t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1703CAB8-306C-4E37-94CA-7DE1B1CC5332\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5122_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06BF3352-3208-4EB2-85AC-998354B8DBB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5122:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AEDAE12-BEB4-4BA4-ACB6-CFCAFB346C47\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6126_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1069193-8BF5-4EB2-B8C8-E11D26562F66\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6126:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C001A4D3-704B-4C51-9025-3EEA74DEC82C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6126f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F661978-39C8-460A-A41D-2B0ADD476067\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6126f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8894B01-D94B-48BD-A2C5-FC2392E7E1B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6126t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06283C7-8104-447C-84E7-5AF39C10E2ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6126t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BA6456F-708A-47AE-8573-AE2E4D19E5A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6128_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C7E0ED9-684B-4A2F-AFBF-0D84707632F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6128:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79514ECE-C041-42CE-BA56-12FE918AEEF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6130_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA20D328-0D65-47D9-9AC0-74BAED085963\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E77EF6-A378-481A-A57D-295796DB4694\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6130f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5962DA-4C52-49A2-93A2-B66180EC97E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6130f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1995BA-25F4-49CD-AC62-DCC372A0CAE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6130t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAACFC5A-9659-4BF7-B9FF-1F384EEBF857\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6130t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648CEB95-915C-44AA-AA62-57DF6366E0CE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6132_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E919175-FA64-4AFA-ABB6-23F965603A51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6132:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29FCCBDE-DDC6-425C-9EFF-F3420F582D59\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6134_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0697B628-D7F9-4799-97CF-30BDC87BBB36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7341AC9C-193A-40C8-ACFA-B95E330A74C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6134m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98928B31-B2B3-47B0-BF06-B1BE9C801AB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6134m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12062D98-F990-4B1F-ADCE-E76F5F879DFF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6136_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14F68B37-A831-48CF-978D-5B69E36B7DA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C4FA382-57C9-4C90-91FC-0CCFA7374788\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6138_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA239D1-6073-4E2A-A8EA-FDC5172B6017\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6138:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"396BF8C5-C6DE-4E5D-9125-8A36B274F428\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6138f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FF0CD52-3BCA-48DB-AD61-3675F548DA04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6138f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B64F57E-1A40-49FF-AC61-B5CFBC8B59EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6138t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10A29477-CD74-4BA9-9907-E0DCFE645509\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6138t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD7263E-7101-4774-9DE2-6EA884ADBB45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6140_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58138B2C-37AC-48DD-9B45-19B2062EFD39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BD7D153-24DD-42B8-85DD-BAD9F073DB75\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6140m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D8E25B-C91A-408C-BE7E-640518184CA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6140m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF1ECBC7-BB8A-494E-AF84-4537ED605DFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6142_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FF6CA76-6747-4AEE-82F4-7ECAF4FA3477\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6142:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4B4211-5D41-489F-90CD-D4433E327B5D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6142f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D987EDBB-1385-4613-9EEE-F2E0E5ECB97E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6142f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D438C9E-657F-406E-8BED-76B8A89CDEF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6144_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7641D6A-E7DF-4DD5-B7EA-E96FF867209D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6144:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"547F2F51-C9D7-4729-8E77-D6EC9234AE32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6146_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C556955-3BB3-46D8-9C59-66318719A8E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6146:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E2CF69-B958-4833-BD5B-D3FF51FEA5BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6148_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351632F2-B56D-421D-ABDA-3F02040B8BA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6148:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5041FF-046C-4DC5-B943-29024FEFCA3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6148f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"172E3226-074A-4A4A-B4EC-DAE60C2DCB49\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6148f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64C9103A-B87D-4906-BE63-9E7CCF549B62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6150_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59D3154-52AC-41CE-B578-B504D8217E9C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02356D3B-CF1D-474D-9489-70C783FB240D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6152_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"702469D7-98CA-445F-B0E5-2731E2F834CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6152:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D190CA8-62DD-48C1-A2CF-5E4DD7087724\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_6154_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F90DF0-D7E6-4F4B-ADD8-EFF15DF2B8CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_6154:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B557A9-22AA-4231-8181-A048BCDE559D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_4108_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C37AE95-8451-4260-A245-F9867698766C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_4108:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B73B8B0-2816-4769-AB49-6103C606220C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_4109t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D77A9E-3271-41CF-9E0A-77237E3CCA27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_4109t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02DE4F50-1762-43A6-9B23-E777AEAC9BB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_4110_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31E0AEBC-640B-45DB-8062-9BCBF6F78E23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_4110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6A4F8AB-65B9-4C1E-AE94-D6354BBB92BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_4112_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EBF7470-5EE3-48FE-90D4-B18E8902F84A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_4112:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"580EE4F4-8F7A-4DEA-A6D5-17EE07223F1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_4114_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2381BA-717C-465F-ACB2-F751B8DB558B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_4114:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A77EDB9-F4AF-4F1E-A89B-CC3C8348E3FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_4114t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF44B3B6-CBCD-4F15-A717-8B06EBC737D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_4114t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17BB6D83-93B9-4998-AF65-B40C6305CB05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_4116_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E808ECA-197A-4443-82EF-4A0F8E56D3E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_4116:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26299DE8-DC9A-491B-B1B6-B8FE2A63C1E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_4116t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82805C40-0057-4DB2-86B1-CD1BD88A7E46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_4116t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E1FFF6A-6E39-49D6-B9F4-E052D17F2E00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_3104_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB055DB1-7C17-4D9A-B634-B8306EF82085\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_3104:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BFD9456-BCA8-490C-9C5C-5B87740DBF8F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_3106_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"389172DD-3511-42C1-82E8-D3E552EF26CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_3106:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F15B3ADD-3D03-48EC-8CE6-31A3DB69AD0F\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Dec/28\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K42433061?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"secure@intel.com\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03969en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Dec/28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K42433061?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03969en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.