Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-0127
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Processors |
Version: See references |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T15:32:09.556Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Processors", vendor: "n/a", versions: [ { status: "affected", version: "See references", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.", }, ], problemTypes: [ { descriptions: [ { description: "denial of service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-10T09:06:28", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2021-0127", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Processors", version: { version_data: [ { version_value: "See references", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "denial of service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, { name: "https://security.netapp.com/advisory/ntap-20220210-0008/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2021-0127", datePublished: "2022-02-09T22:04:16", dateReserved: "2020-10-22T00:00:00", dateUpdated: "2024-08-03T15:32:09.556Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2021-0127\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2022-02-09T23:15:13.817\",\"lastModified\":\"2024-11-21T05:42:01.320\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.\"},{\"lang\":\"es\",\"value\":\"Una administración no suficiente del flujo de control en algunos procesadores Intel(R) puede permitir a un usuario autenticado habilitar potencialmente una denegación de servicio por acceso local\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4003B029-36AE-47CD-BFB1-1F06DFEBA0C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADF19F8-54BB-4BF4-BF1C-515EBBEE2060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B67D44E3-F8E1-4EB9-8D91-5777DC97D497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E4AC5E9-94DB-4970-BE29-747503AE81E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FFA194-E200-4F4D-8E66-60D0134184E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12FD8D3B-0FC0-4E8A-9476-3092BAE9F15E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B950F6FC-2848-45B7-9C28-B0DF46BC442B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABDC4948-B063-4327-890A-C8D9F955C7B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95101653-A2BF-47F5-A209-097CA98A91F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"226CBC16-EC2A-4498-ADB3-655A0E9CF396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9278297-5E4B-40D0-8782-E5AE87E43B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF64D95C-653A-4864-A572-CD0A64B6CDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B2F570-1DD9-49C7-BB72-0EA0E9A417C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F751905-287E-47EA-93B8-2BA576052AAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614B1B4E-E1D7-417F-86D1-92F75D597E36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD11E86-B786-43C8-9B67-8F680CC30451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D740D69-83B6-4DBF-8617-9B1E96DFF4FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9963C9F-2D15-479A-A6C1-0C9863904B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8B15567-BFEA-43BE-9817-98A1F5548541\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"984C7C7A-2F8E-4918-8526-64A080943E0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43454510-4BE7-4CD1-960D-AE1B36EFBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7AFC285-2248-45E7-9009-1402628F17E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"078DAE1F-8581-44FB-83EA-575685928C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887BEC29-AD0D-4BEB-B50B-F961629BBF23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93859A03-DE41-4E7B-8646-93925ACBFC42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9877F278-641B-4F83-B420-AB4E1018EA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABF9AEE-BE1C-40EF-9E5F-6F3641BA7CDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C60AF0D-983D-454E-8940-209C471DC041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BAF09D-8199-4579-B25A-E7C5177385E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21EA30AA-713F-40AD-8C94-C1129198EE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"114DF43C-839F-4066-AA30-8DC16B1D6687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6006u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B47568A4-117D-4E76-88DA-F8A4139A83D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6098p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F3324D-6E58-4233-A0C4-4F2C058E8D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6E16A4-5B81-412F-9B02-D15288F0EB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8448F47A-F956-4228-9A13-24AE86C532CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C4115F-E374-47E9-A81F-CC06FA72C67F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE81958E-5DFA-424C-9662-ECB1D9B738D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE0F2403-8146-4CA0-9E89-04022B375CEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD67C284-EFCE-4530-8E68-42BB1B6F15C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6157u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C38AF3E-4547-4CA3-9078-6CBD372331AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20B1E424-885F-4BB0-9257-8284A18B1655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BADEBE08-1478-4B88-9E06-5164BA0517DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D672383-B9AD-466E-8D6C-68DEC432B9A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D16BDFF3-4CC0-4423-8385-C5E49C941F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F2CA68-9EEA-421F-A92E-E7685EC010EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC9F763B-B469-42DC-952F-48448121373F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C17DCC3-9200-4198-B08D-EAD531B59995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CBD3FB-0835-4F28-BFA2-3D07459066F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B6B298A-1480-41C2-BE7C-7291E7256D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14C20D2A-CD26-4019-A266-AB4E89EBD2E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B608F333-BD78-4082-B2AE-0F5BBE7E0D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F609E73-203F-45B9-9A3A-DC754B33860A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E3A734E-973B-4904-A905-51E438879B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CF355B2-A5D6-41CC-8404-2B61A594BA6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E86321B-B1BD-43B7-A7F5-05CABE35F40E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD84789A-B7F4-493E-A3F6-D5287ACFEB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A504EF6-8F7D-4839-B16D-FDCBD3B22287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47B28199-5B9A-4AC4-9529-77A6FC591DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33B0B0C9-54ED-4D7E-B0F2-C87690056800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6287BCB7-8EFD-485E-B40E-AE6B9DB067DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25227F52-7398-4E68-A973-B9177886BE0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D78093B-076C-48FB-A224-F94F5743ACF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B230FB82-C498-4118-97D3-3835CB713E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1DCD6D7-7FF2-419B-A41C-CF1FA830F289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8127E47-6082-4313-B310-1C6278471A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C14BA084-59CC-40E8-A62F-7AD1C9DD9283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89E9DCEC-6AFD-476F-93A1-E19BFC124BD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5523F4AF-8CCF-41B1-ADC8-D8363CE0A9D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53F1B439-37B2-4425-8359-D3C86CD76BBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A121388-F0FF-420E-98E2-B6F4B53FF88F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B83D5E36-BCA6-47A6-9C78-5A5FAD89F95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CA88723-29A0-4F7C-BED3-70E35F913384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B0AC6F-52DC-4697-A29A-B4DE51B41D57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64206B12-9CB6-4E4F-9200-EE062693FC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98752CBB-B870-4DA2-BF09-0A6A847E7F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AA7EEBF-ED6E-4838-ADAE-0D7BA4E65867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71615EAF-4DF4-4B9E-BF34-6ED0371A53D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"376B6DD7-1284-4BD9-88A4-5C34303CC5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"403E8A3A-28C2-4329-BF31-1A530E317959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5F6F725-217C-48FF-86DD-E91A24156121\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"365696BF-CE3D-4CE6-92A8-413DDE43774E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6F3DE58-EC72-429F-A223-F2027D2828AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8515D29-3823-4F9B-9578-8BB52336A2A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE048AEB-094D-4102-9DBF-488FEB53FF89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E6B9500-2C37-48D5-A0BA-A159D04AC6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF497A0-30BC-42A4-A000-C0D564D4872A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3025301-52D3-43D7-B6AB-F3F0A5C882DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9466A6CC-8D69-4EB5-94E2-611297120462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2D116C4-698B-45BC-8622-87E142B37922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DCA6E61-F1C9-4629-9068-545B19CF95E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36836EB0-99DD-4217-9182-1E9FC5656C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD507601-CD6D-4F11-A4A7-790FB740B401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C26205-C602-46F6-B611-424709325D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"464587A0-9EAA-4DF5-AFEB-15F2FA9CD407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1940F59A-67FD-45F9-9C78-51A50687628F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B722E2A-1262-44FD-8F7C-F9A9A5C78744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40E9EC2-A8A6-4800-9F9E-B1237832D6F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"158CC66D-32E5-4396-8E5D-4D90EE9AB62C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E84F0381-296A-408E-90D4-A316EE894A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092E3E45-5F58-412F-BAC9-C3B5290D8349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6FCAFC0-EEE2-43E4-AE90-1803588B5689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8640175-3BC2-4C7B-A5A3-51E5677EDECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D902B5-D135-4961-AED9-EA6DF06534B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B858B433-9DA0-4224-B94C-4962FB3A4138\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6B5FC3-8E55-430A-A55A-AF541690C576\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55568460-F318-48FB-90E4-55CBBAF13E59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0242C717-1C3F-4D9E-B068-F3102A40E6A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB84973-3DAC-4458-A817-943302F5EFF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B26C730-32FA-4D51-88FA-E724147147BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFF7C5BF-E151-42DB-B0CF-E2589904C9A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F611716-F3D6-4187-AE71-4FF87C95C18E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F67974-81B3-43C2-8DAE-A66C6A876B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1054FBFC-1609-4301-A0D0-B78878FB2427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F889F1-3B57-46C1-9C23-9E78CD0DEECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93929C7B-D4D9-436B-BA69-FD3C22FCEC2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7F9109E-EADD-40F4-8360-BF7E37433E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41F7C959-BC66-40AB-8038-D37181A4CE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9B3858-E58D-471E-8F12-DC109A133B81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D37104E-78E5-4368-B67F-1F8C63873C3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B6BBA6-BAA6-4258-8A5D-94CD786A3B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6402p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F01770-A6AD-4F7B-8FD6-C066241A139B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DFA368-60E2-42D7-9C59-04F61F1A1FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0974E563-6326-4E79-95FF-40625440696E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B9D15BA-CC1B-4D83-9944-2593E2BA4AB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"467F294F-2FC5-4B2A-A1CD-4FE90F9D9C16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E904FB93-EFF6-4E8E-92F2-95C4952B0240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B232290-B3AD-4BB5-80B8-4CB3E6259A44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6585r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2607AB1-D851-4D83-9198-5B9A148E9B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772568B9-C502-4154-9320-16D78BF60B34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"912614A7-45BA-411D-AE77-610EFE8D2A35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FBD651A-306D-4341-8DEE-2E928CA6E0EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6685r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D61E39-79F5-4606-B196-D79A9C2C738C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E993BEE9-72BD-4615-B1BE-5E9129D61ABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA6BB38-CDF8-46B0-9910-897AB7920D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF244D02-2B47-4884-8D70-37DFEB18CB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE85AE7-B4BD-442E-AFAB-CD01744C91B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2425FF8A-158C-40EE-BDBF-43E7641BC058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA681B4-37F8-4E2E-B73B-E0E17C66B754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"173C6F98-4022-4F40-A39A-D3D490CA6461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EACCCA-7ADB-40B8-87DD-A55313E5BB97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F1BD53-55ED-4346-A67A-141B5BC552CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44D7B5DF-716F-48E6-9445-BB56A620DEF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3E6176-6F6D-4488-A03B-2BBF846ADC93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF705120-459D-49BA-BDCD-6AC38D95C820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B91585C-4BD7-475B-8AC8-1B813A698D77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70B7093E-97DA-4BED-AE7C-87090B82E5E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFA675E6-83DD-47FF-BEBC-D32E5223A065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DDA599F-09D5-4351-B7F5-351A2E04E091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4D55B9D-4BAB-4082-A33F-626E15229333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E920376-561D-4892-97A2-F4400223B3CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D350A92-3992-4464-84AB-960ABCA45698\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF02D685-1E67-40E1-A858-000498D5D877\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8CE3D72-A3E6-4E8C-8673-D9265D66A449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC9F52F-6669-459A-A0A9-8F472E1F2761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7E91B92-4DB7-4866-8370-C6F8616D3D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F465BF-4548-45EB-AC40-384F4E6248EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7950151-6BF6-4A80-9370-ED92B59635BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F7D93A-7C16-4189-ACF2-9B3760180FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A72E6F1-5A3C-4D8E-8F5F-0D92BC1CD8CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A5BA20-2193-4C17-BBDC-8615D9333D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55240EF3-B56C-45DF-B868-6DF59A349E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26975700-3A56-4D17-ADDC-77CCE82A6C98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DFFFEB-CC63-4F51-8828-C5D4E0287264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B176D141-26B0-477E-B2DB-2E48D6FB82AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43B9F540-DFCD-40B2-8DE2-9AE9D123A48F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD97F84B-ED73-4FFD-8634-10631FEE03EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2243674B-E505-4FED-B063-953A1569EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA08C262-414E-401A-8F91-131626FA82A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1978F85-5BA5-468E-B797-7FA7EB4F489D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D3D0CA-C981-4091-99F9-203DA8F156F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB23D0C-D2BC-4E7F-94AF-CAF171A64307\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC9312B-40A7-4D4A-A61C-3BA865C29F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EBECBE5-2BF0-4175-81CC-C6D054C819B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB33CC4F-9D51-4A11-B063-6E78F0D71555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA491401-C484-4F77-ABF8-D389C94BF7B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F8B600-B618-48E1-81EE-14A8A843F09F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42ADD367-82C8-4761-AEBA-A0200C5D1CEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF75C0E-BA48-4C56-8398-109D06B5A5D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25329A6F-9D49-4EA7-B9FB-8C2FA5343475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22921B65-513F-4ACE-80A2-4A31199BB5EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63719B1D-5A98-44E3-80D8-CF0B4C1C6F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5365D3B-1B0B-416D-ACFB-23843FD25EAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2556EF0A-B29F-4E9E-BB77-955CBC851EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AD253CF-55F8-4350-AD79-6CB5526DEB57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5601E40A-96E1-4321-9682-055A1C607488\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF36D9CC-2FD8-4D08-8712-E625D4754613\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3252CF19-9D1D-4A46-9C94-0E7255CDDD8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E11C7F38-3313-4F6D-9D5D-E61C89E716B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70B0C976-3B68-4647-909A-5D574D711C7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA18192E-7DBB-45BB-8568-CA7159AF8CE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2FDB568-5340-4DD8-B933-1CD64C370BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"104B88E7-3B8F-4C4E-AD07-CAD1DCD7898B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12ADA9A2-6E64-4F17-B369-816639F0D3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"514B7B5E-D60D-464A-8CB0-273044FD2E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB608EE-83AF-4192-93E1-7DDBA5F6A54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4266C712-B84F-45AD-B108-C890E073FA82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD9E14F8-2003-4D8F-A9E2-9633B478DBA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD5E62D8-BA9C-48F6-B3B6-18DCA83D8C43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC77BD1C-BB51-4FE4-83A1-B69E6371B15A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4DF4072-DD12-41CC-8E18-E178BA3C8A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF0F0769-A572-4C23-BDB4-647CAEA8BF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E754A91A-7DBC-427B-A01F-9501D1A4668C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83610FBC-6D1E-465F-AFE3-625E951AE4E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4205855A-2A51-42EB-A5EF-4AD6DF409A6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"035563B3-4F45-4B12-9F2C-C8ED678232FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F296558-643A-40A8-AD03-A88F70AC121D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F821873C-2F30-4D98-8570-5DDBDF5D3C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260E6E09-671F-428A-A653-0E594FC2F5BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0133C635-7981-470D-ADB3-92A9C884F273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD248D-0B95-4BE1-917F-E0976447927D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5726D5D4-F188-4F06-B78A-2C7C694A40E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72467515-7793-479B-BABF-839275CA9AAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B79264-C756-408C-A32A-BFD4AA0B20CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D3DB891-40F6-4000-BEAE-A1710C70C43D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3EA33F-D137-4B24-9211-C8A62A7427A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86FFF97C-C121-4F91-B62F-057356B0A048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B09CA-91E9-4D11-AA11-B84F40495E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFC55E4-D84D-4588-976D-1E2637B1BF0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC1A189-D822-405B-A090-B1573FE12B14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C57E58-66E3-4FEC-A88F-B82C4B372B2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A0BDFFB-638F-4FB7-A43A-812874D8774A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C468AE-3FA8-48B5-A05C-0690F1019190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C173CF7E-81DF-4AD5-AB17-A4C330B933D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638549EC-1BB1-4206-B8DC-C0101BBEF8A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F450DA-5FBA-47BB-9A7D-75873FB3E69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"112701D9-7154-46E5-BF36-EE36A607C7DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14CB46AD-0395-4675-9714-CCB2A180EBA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B5258B-26E4-4853-9F27-4BB12886CC38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5854EF2F-7B58-49FA-B09A-2066799E2F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B1B04E8-A31F-4027-8E05-5461E7855F04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E474DFB1-4173-40B8-B02D-42AFC5C86F9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BDD476-E402-408D-9BD6-886AB195704D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D566CFB-935B-40E4-9F4E-6216A42E7EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A97ED15-D0C6-4B64-BA08-EE50A6990272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D57834B-C031-4301-9839-7A32F13687EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE126ED-B743-4C6D-95FF-04F473A9A008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D901944-8E2B-41E5-BB82-CF1C97064711\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A13E353-0063-468B-96CD-97BF91C747C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913BBEFF-49E7-42AF-A850-B49E5A12AB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8580A81E-8BDE-4EB5-B830-6AA7550A25C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C1205B-6AC7-4DB5-B247-2108511D9957\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA47107D-237A-4184-8BA2-601660F7FB5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9862E49-124E-4B7D-941A-CFD2668B6481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43756EB8-9F85-4499-99F0-43E69CA3F470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE6572E2-5B24-4E21-9F6F-3A7A17A9F098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85C7AD56-CA31-4C08-A5C1-B50E767E1FFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0304CBDA-AF3E-4F32-BF45-FD2199D1E025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957F3AC9-D071-4932-B2C9-1643FB78BC7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1395788D-E23B-433A-B111-745C55018C68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05EA3461-021B-42CD-B4BD-4D2E8703DB93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6774C8-431B-42AC-8955-02B529222372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F41025AC-6EFE-4562-B1D1-BAB004875B06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC1ED81E-3D62-47FB-8FD4-B2732525C33C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC82E058-25FE-4B6C-BA3C-AB043CFAB113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34DD3CCB-91D5-48D6-80BC-CA643385BCE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41EB643A-7C3B-4017-A12C-FB48A4F6D9EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04076FFA-D74F-4501-9921-D8EBDF97CD20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4440FC7-F90C-44E0-B7FB-C88BC95EAB77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8846D3C-39C6-48BE-9643-ACC479416257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07279DDB-B07D-4224-AA1C-24B4F3D63BB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F423BBE6-327A-40DC-8BCE-BF43600A68D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8706g_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74DB5608-BEAB-4080-BD40-76C2FFB4DDCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08718840-D468-4E86-8FFF-A2B1841E6BF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B77426-B579-43C6-9340-F291138ECD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE776B91-9E25-48F5-A4F0-EB36B704AEBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D63DC7-0623-4777-86EC-06697FEBFD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7CD68D-6177-4F61-ABAF-C88453BD6C52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C289687E-4D0F-4F32-92A8-137B5D6AA3C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC758216-672D-4F7B-8CF3-6433B06AA2FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419680D5-21E0-491C-98AA-9D079213A020\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867027D4-9EB4-4BAB-BDCC-FD43A087442F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CD303F-AAE9-4635-987D-742031232BDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57014B8E-5689-416B-9FE6-CE4A259E83C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0320CB-05E3-4D5B-BCEF-D862566B0AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3625E5-4583-4F38-B6E3-68FD20E54ACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C365D42-1DEA-4FF2-86E4-1CC27E52E40E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F9F143-0AB4-4302-82B8-B4EA790EB08D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE73B0A0-E275-449D-8ADD-86AE188DE82A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE06C64A-1610-4340-98CF-AC91258AB215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27F79F3-EA0A-429C-8DA9-BC276A94AFB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B07609EB-E10B-4253-938E-81566036D81B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC44D69-AAAB-4524-9D12-F1A606D57831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D23D2887-1246-4EA4-B8B6-57BC7FB869E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEFC46D5-B23D-4513-9669-4DC53662F87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93E897C-5D7B-4532-99D9-53192A1F776A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33D0D618-D738-47F5-B7F7-C7F07972C893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7A147E8-0778-49CE-92EF-ED1950138528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D264277-00CB-4FCC-ADAA-38536609D0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DFC6D19-9E02-4DE5-818F-931779A41F74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC25725-73F6-4948-B17A-A05E8978EB78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D9BFA32-89B3-4E26-B980-2694B5378D8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FECF6BE-2CED-4510-91C5-195686C9C421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B903E2A0-EE73-4F13-AB26-8F5644462E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"170B497C-05F2-46B5-92CD-ACF7C0BE1711\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEF53EA8-8EB4-455C-A986-405DBB122D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B97260E-1D7A-45B5-AD86-EBF8CA259FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58002875-D63D-4ABD-A8B7-DCAEB7E94AE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC07903-D4B7-423F-9F79-7DF45E5350BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA65F0A9-8BBE-4674-86B8-894484DC6C88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93CC48C-DCCB-442A-98D5-3165CCFAE7F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"659206BB-510A-47F8-8B6E-FD030A6BE1DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C3257F5-CA55-4F35-9D09-5B85253DE786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5598510F-1057-4DB6-838C-8945FB6978DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC2ADBEF-CF97-410A-816B-F9D1E3BAF205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"655E770E-B9EE-4B08-B1EE-F393C7F68941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC47200-8F3F-4969-AABA-39F4B1E4E263\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB17629-2454-478B-8E1A-AC2D2FC2233C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48A2969-DC53-48E2-A5CA-4DF2B00D1960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2534F0E2-C427-4514-AE51-26EB0872B519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B485AC9-B986-4100-90CC-E4BC9B1AAFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76BE235-C991-43BB-B145-239D95084BC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6748F85C-A99A-4380-B01A-A51DBD43AED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421F0AF2-5F41-4F0C-A909-D76D72AB5FCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C04332C1-9652-44ED-BD97-5A6AD0A4E6B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D376C32-99BE-4DF4-A63D-2156D10EEA73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0D6C21-7DCE-4F8C-9394-D0006695550D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD6B51B5-96AA-44C8-9539-9D7F67143DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB78854-1E03-48F3-BC86-B0934641B47E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D3350F-8083-4FD3-9432-36C10EE911EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB28789-A195-4EB8-AE96-6E1EFEE93E6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C96A17A-44EE-4FD0-9187-9BB9202AA9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6425C6-A338-42A0-B236-12B33147931D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF3F6453-51EF-4509-94CB-24E8ECFBAC5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4861FF06-6720-4E5A-B599-F7F96D7D4FE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF098E89-4979-45DB-AF4C-A5D0F5CE6F67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A263FA56-5F1F-4E91-A354-38648E130685\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102AFB09-B4EC-456C-899A-A9ABDA120D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24E8214-881A-4C15-A544-FB3FD5D14DCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02454A49-0345-4927-89DF-7A37C25E4E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1EDE72E-3734-4FB5-BC77-B7C3838D41F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E07450B-D81B-474D-9150-C9D8A62D44A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A892B60-7FD3-41A6-9997-586B76757416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4701D592-F06C-4713-9736-19DB130B5E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E6063A-23C9-4845-B575-5D330B6C68F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50C73A4-D52E-4560-B725-61F416E18505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25570E2C-BBE9-402F-9631-FA5014767CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59D57C2-CFB5-486E-A340-E63C7D7A8B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"998DCE68-F426-47C5-80F7-BFE42FD69DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g7400e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"917B3772-3856-4C63-9DC8-FE887A93CB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE04ADB-3037-41E8-8DF4-8588FDFB759A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g7400te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBF8567-4F5B-4142-9A3B-BD6AEE33595F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DB488DD-D97C-4E21-A055-E6CECBBBC34E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DC12C97-9966-40E2-8B23-B4453EC9EA6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E687CADE-6E49-4284-BD41-6CA2FDD846FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"404409CA-326B-425D-A4E5-1A3C8CC45344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5E65D0-6DB9-41D2-9721-8F1232D8155F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46066C5B-DB48-4B83-9E5E-3809D3F7FED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99D4F6F-5874-4F5D-91FD-E265DCE86667\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DB082B-E169-4BE0-81DC-B2A7219C4DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA0A03C-21BB-4C5D-85B3-FF579F34E82C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD387ADD-02CA-4154-BF86-0DBE664FE5F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F2A5C9-C593-4C42-A47E-F563C4696137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA7576BD-43FE-44D2-A665-F78BDA4D964D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA12CAD-F622-4F14-8847-AFD8DC250B40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA062554-DBBC-4215-9705-1ADA545B5887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCCDD79D-80C4-4A52-94F6-F30237AE0C53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC6E2595-D9E7-46D6-99C8-336DEB1B4020\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"829702E9-C0EB-4E4B-A979-41A2235B182B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A84814F-B070-45B0-ABC2-1BAAA212EFD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BD8917-5BEA-491C-B6E8-486FF957A876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B897D23E-1BC1-4FBB-AD00-422413C1749C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C50FBC-6933-4E98-82B9-A70B1C836ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F8AD4D2-D48B-4F53-A0BA-A90E5A970832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"971C6442-6546-440B-AD74-44A5BB527D11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4B6C48-261B-4B0E-BA2A-7E3060D01F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41FC8B26-7611-45B6-A37D-DF7025E2E92D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"543DB437-425F-4FF7-BDBD-FB5CC17E0056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E8DD28-EC33-489F-A71C-2AEACFB16FC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84B97F2B-A3D1-48A3-9FB7-755191FDD720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FD9FEF-2186-4416-93B7-B743657412A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38161238-5D40-485F-B0D2-D7621EC317D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B804174C-53DB-4641-BD26-3ECDD9FBD638\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3930A6D-64DC-4953-AD7E-EED0C48B048E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B10FCF1-F496-4166-9162-41012C4D2B16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACAAD0F0-9182-46EF-8399-C04FB472BE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCADFB25-DCBB-4901-9E4D-132ED49C7F26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0327393-DB2A-455B-8E20-3EDB3766CDA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E00698-8A08-433F-8852-8EDC422A53D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4925D0EA-D524-432F-8417-892BB8C3DDFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3757F7B-4283-4ABF-974B-59E4E2358035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D86199-5CF3-4E7A-8295-50F958EA4B4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"122BD094-E815-4081-B674-B71AC193BE0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43126A13-5931-4989-BEFD-E1A096F98D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342E0783-288A-4DB0-A657-29937903927C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C40F91-138F-4396-9A6B-B969F6AC30B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CA9365-B1C4-4188-A9BF-19215AFF58A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4797D2E-1270-447B-BFE4-CC96D9F10D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA77EB3-6F11-43BC-8B59-84217AA73205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0866F1A3-8B9C-4B5A-B30D-71B3465EC80A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331B8F10-3A20-46A8-B960-3546271CF701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE638E59-DF75-43B1-A6DC-10A838B05B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109FA97C-10EE-41F9-B52B-B37E31642251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67B3834-E59E-47AF-A806-13A990E812B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79214F8B-1090-4DCD-B1F4-0FF78FC29C4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD176FB0-7427-4F2E-A969-72062BB3EF98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B278081F-F900-4581-9D10-B5A2ACD2E2C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45689B37-5085-41B3-BA9D-F05FD07DF1FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7186EA5-448F-473A-8FC8-058FC823ACC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12F0C71-8F25-4C77-A3F3-1231AC53C0CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB179A6F-FED8-45FB-89C7-3B17D6F5EB21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F58AEEB9-919B-4C6C-83B6-080846786A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BAE174-A158-4807-9D67-36F795028D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD38AEA-979D-484B-82F0-0161BA39E9F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"780AB9F4-0C87-4528-B53A-69FBC4D87ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CA54AE-915F-45B9-B775-C04589E49802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB86F018-1F56-4146-A78E-C7BF7B616023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63650DBF-4DBD-4655-AE93-5CBE53F8E0FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00912C9C-D386-445E-B390-E96361ECDFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B582A1-784C-4BE8-A0D5-706DE01D769E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320597E9-6A2B-47E6-A33C-6B31A81902EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"556637E1-9502-41E7-B91D-082C92F233A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA930BC-EF68-4AD5-AA1B-0659358028D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A8EA870-2228-4E81-A417-30E040A5C0E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656D31B6-1E8D-4A44-9D7A-023051E7050A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49EEE5AA-3867-4137-B165-5004C34C77B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A38417-1DB2-4C85-80D9-D3968BF7A83B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F74E9E4-F84C-4B7F-8A42-20EEC60986DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F99F83-A7E6-4AFD-BC42-7348EF6613AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A62A9F4-2B98-4F2D-9143-08D1689E38AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FD06CB-F456-44BD-900B-06131DC68B6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9044310E-4DF9-47BA-9D05-C1405DC8CDB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA881CDA-1C16-43F1-A7D5-69502512A21C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E629CF7-A706-4DD3-B3EB-A1F9711B0372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1BCDBDF-A902-43A8-94A8-13541FB8CB32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC1EDA9-6CB8-4643-AC65-76B892319879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15DB4F8D-E42C-4119-83BD-44D6AB9319B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E0227B-8F2B-48B3-97BC-73BA1BACEED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BD1F0B-7B75-4A5A-A708-BDE56D237354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE01A935-4048-4578-8FBA-1D12A95654D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28D7D164-E631-4D49-B87A-0B7885148790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A10975-3375-4FB3-A008-56EB2ACD2737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A99895-6A48-4A44-B0F7-7BED55C677FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AF4F98-0672-4101-9825-57B0F64EDBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2231374F-222A-4BA3-B14D-F69860668F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"057E3667-7BA8-4142-8A1E-B957333D776A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A77114-92C8-48C4-9D12-3ACC3030D5A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13B5BF22-5E95-46A4-AF05-450CFD1312C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9490F926-AD57-40F3-A523-61D67486DCB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CC9B92-CF59-4121-9638-F4D4521952D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC6592D-743B-4656-B1C0-247F36ABE5CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCC32129-C5DC-4D26-96D5-219F5291D6F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F4426C-970C-49DB-950B-3F5ED17E682A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ADED698-2702-479C-A24E-E9E6F35E9AFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86C0CFB-72A3-4446-9601-2C956C9A71F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE862F15-69CC-488E-ABE8-1E23A5A1089F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9087D09E-ADCB-478A-87FD-B7113FD29EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B43E11E-5350-4DDB-A743-F84D4D2286D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D64D1ED-A386-4475-99AB-7727DE67E1A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EFB4646-A5BA-4662-A47F-62407AFEDFF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A923F6-E352-4752-B7D3-007FE1CAFE06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070C20AB-66F2-4EE2-8134-5E40DBB9B9E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA49CF7-C6BE-4337-A0A8-A603D8955EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8F7F6B-847A-479D-B6B1-BBA331D06DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C375A9D-C7CE-49A6-B08D-9CAB22E16D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06531E6-126A-4FBB-BEBB-F9023C4738F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B8CDF0-1489-4E4C-B004-A22E06FC10D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6ACF161-472E-4088-85C2-5940C9C88D45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0B94F6-EC15-4C12-8BA5-CC6602A7A725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067C65E5-5392-4DAF-A6BD-640D78C19CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1647DAC-CED6-4DAF-8F82-A42D6D691DF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93CC498-F558-4C2F-9E14-7897060CA9FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6839AE9B-9A8A-4312-80FC-0549C675A815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E0E7358-1EC1-43DA-99B3-A2D6D57E0121\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43808CCF-1EF0-41CE-983D-DD6BB775895E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C5D3DE-5506-4F16-B7F9-5032A1277D23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED598260-2A9B-46F7-AA85-0DA97DA0D42D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06F1CFD2-8F32-4CE8-9D9B-C65B332775B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF1F73B-4736-40BC-9053-951B5BF1059E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA47606-176C-4F6B-A316-4C536B63FA4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D609DB7E-AE80-48E0-B7B6-E622B6208ABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09C3656-AE49-4F26-BD28-B725E8C40304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90F0D1EF-2FE1-498A-AE38-BF755A680E88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22243DEF-F01B-4774-AEC1-40D776E1167E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25934425-944F-4B9A-8A16-F1DCBF3D5032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A5BC76B-A4FC-4702-A544-889E62F8509E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F4E44C3-D29F-4057-AE12-BA19FFFF69E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"383DCE68-3882-4274-AA4A-5E030530E4BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04EC7421-963C-43F7-9450-2E204BAFF1F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3AF74E-C719-4E55-959D-681174FFFB90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E290F38C-7A86-469D-9E6A-F0EC69DBE23A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EF77397-85D0-4EC2-9887-2D0D9D253450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E9761E8-7978-4141-94B5-EEFE7C00BC9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E921DEBA-3063-4639-9823-2FDDD8DEA793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF44A7C9-834B-49DF-B1B6-B1575473179B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5983B72F-9194-47CB-B444-2ECC6360B686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E0E40BC-5745-4AB0-B991-61A0C63DB284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E207648-E57F-4C43-8FDD-049BF9214664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39EB131A-87DE-45FB-9025-B02EC28C4304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF30717-CBEF-42F9-AE0D-4F6A1877EA55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99D0351-303B-4ABF-A7FD-734176095307\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B080431-626C-4A7B-AB37-47EE6811A5A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D48CFC-1322-4C53-8B53-88E7ACC724BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F6456D0-32AE-44A9-9F63-AD64B5E49182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38EA99F9-22C2-47ED-9DDD-928E19C4C51E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8867B2-F297-4D30-AD43-77B0F67FAE3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178345A5-9A38-4C8F-B3BB-430276FA4998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831A7D63-4638-480C-94CB-ED06613BA75C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178D9E36-79EC-4672-8E46-0FD6597CA1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED0D492-ADAB-41ED-A283-024D3CED441F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BBB5A97-EA4F-454C-819C-DE1CE7018E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9733E69-E7CF-444C-B72C-AC8E5DEF2449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD24563-9157-4DE1-95ED-D4E3E879219E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F83F8602-6679-4B3C-BBDD-3BDB2B317F70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CD3E45C-1943-42BA-9F6D-EA64D67BF954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7B4C84-1258-4F2F-B8A3-55353B3D13BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B27F755-4C38-4469-8A9D-C9266BDA53ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E21977E-7085-46C5-8E89-F952C2EBCE04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB72D13B-5880-4CB2-8E80-CB6A39B5A302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BCB7D2-4B68-4FF8-BFC9-06C39A708C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8292CC-DACB-489A-BCB2-73DC2C6F944C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D83AEDF-2671-4278-8088-BA517192AB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF72F37A-2F28-40E6-A84B-0E1DF63B1812\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EAE9CE6-DA95-40B0-AE65-656FA4603D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5241B3E0-F968-4B16-8BF8-191C6F7B224A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B82FC910-F3AB-42BF-9740-EC09F0AC179D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAE2B11-B0F5-415F-BD6B-E285EF9C9095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA58EFB-7672-4902-ABC1-65217AA617AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E2764D-7D6A-4CE0-A628-FFE966A6462F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D66D18C-17F2-4259-B1D8-7C63797A024C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25C8DFB5-9D8B-4370-849A-DC061910E54F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B704835-1250-44E1-923C-5DE2F4DD25D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3CA224-B5DE-4451-9CF9-929ABEA242EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3D8E340-AE91-4F29-9F22-E0CE6718FC13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"710DBCD5-788D-4140-AC16-EC6E126CFA66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A767EC83-AAED-4FEA-A35E-A503369FE4FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20821868-F7D2-4132-8D63-98E1089DB46C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB9295A-8832-4670-B268-FBD0BC086447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"489BD4AC-50C6-422B-A2B2-00A70E611114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5694238-F4E5-4689-ADD2-67C25762ED92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A57D44C0-AA8D-46B0-8923-ADB312E3937F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A551BBB-76CD-4C26-913F-B02C66E5D846\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4A44F2-68BF-4709-946B-C976DA3A9C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"038AC553-5523-4687-843D-6FEA7264EDEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DE5D09C-3272-4810-9F41-97BDBBFE4160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59C5122F-D822-4E71-A417-88EB51F1786B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14C3438-B876-45B9-85F5-61354207AF8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9236F094-B913-43F2-B703-CE33B9CEBA0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345FF353-FE25-41F4-97EC-FF32BE2796EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A9AD79-9B4B-4EE8-810B-359901C3540C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19BF77DA-E159-4336-A552-B22BE437670D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E86CCC45-270E-4760-A7E9-D39C74C00FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C105930C-D2BB-4FA1-B5D1-882D90D867C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45227E88-ACFF-43A5-AF45-C6542A6EF681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA2030D-CEAF-46BF-9669-19EAD541BDB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1612AE8A-3165-47A3-AEA8-65F4156C48BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5168E40-DF2F-4E39-8B5E-9659EBBB99A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94A6DA7A-7C97-40E1-B31A-B92BB658C429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54AF128B-9984-4C91-B7F6-968DE376C3BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28B167F1-63FA-4C86-84AB-836ABF84E6E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955420F9-3A3F-40E0-9940-DD43C5C78D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4A437C-6C00-4729-91CC-D27EB3542633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74ED727D-B1A9-4F4B-92C7-3F00F3A80013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C24951-B3FA-48E6-AFAC-6CA0D2348230\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"185E8FBC-9EE9-472E-867B-0B0DEEECA13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3C00A0-C28A-46EB-853D-DAE3819399D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CAB607-87B2-49F4-9FAB-662D5EA3D11C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7C504C3-7EEE-4A0F-8589-19C1E806E690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5230F6AF-88CB-4EE2-B292-8B9A7217D10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B45C39D-03E8-46C1-88DD-94E382F4A961\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2DC691-025A-441E-AAC2-C8583F54733D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE07EA7-4CDF-4038-A948-6AC126C7F6AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06A2241C-37AE-41AE-A8D1-D9AB18CCE16D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB6DEAA1-3209-4B49-B931-43E8C1C5BE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE086F8-5C8B-4F0C-B53A-76BD4E67B678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB15368B-21A1-429E-8B9C-A095C4E8BA67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA925F96-6DDD-4F71-BF13-710C8A89D860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E41414A-6B0B-4511-A9A1-7FF99DD25DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91EB66B4-8F1B-4F35-9371-17FB761997CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBDFD1AF-2716-4C95-ADFF-79EFA915C286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5390A12B-80BD-4889-BF0F-95E65D10D037\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05637A96-AF09-4FF5-A918-AB369AA2D1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33FA0279-D587-471E-8EC0-211F78DA4DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1CC27DB-11D4-412A-BC69-CF32A0CABCF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8FE9694-F0E7-4B45-82A1-065DA96B9794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC93757-5FD7-403D-B5ED-CC8793002352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF8D8C4-29EA-4D09-87AB-A570403BA0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89421EC5-52E5-441F-AD3B-5C5E964F836D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2117880B-FDD4-4A90-B29B-6D840D26645D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8EED1D9-75CC-41E9-9C0C-C648E0717024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB43A67-9DD7-49E6-BA77-220120C90700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3413CB-86D3-4684-B651-DBACC0660E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB677676-E793-4158-BF53-3F5ECCECE203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F32E6092-1AF6-499F-B176-F575E766E8F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E524AFD4-2D9F-4A4B-82F4-13BCDE99041E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F309BC-6F31-490C-982B-14F9319276F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA909754-B60A-4B30-AF42-4C8734E155AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEFB056-0872-434B-9630-28A1AAEAD470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A62CB9-FB01-45CB-9E10-E72D87C0E1F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD8EBFCC-AD76-4285-93BD-D14219C6EA5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FF7E334-6DC7-44B5-A102-649A68300C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B4F7FE-61A3-417A-BAA9-E686A76F3A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7305838B-84CA-4BB8-A350-B2D2844F1041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D356D196-8AB0-4387-A644-C5E68174A60C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89587A92-6234-40C3-83DB-F72319FFBC79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D557D68C-8279-4BFD-9EA6-17A83754B8FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ECA0BC9-1CA4-4B95-B98F-9098B2550309\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1298CF87-124D-450B-928D-F39CCA2BAF42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF12820F-A2BE-44BF-A85D-7F4623898DAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853DE44A-84C9-4959-865F-D538DF895647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13326C69-C160-482F-BF28-5425B57BE738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F15EF0E-37CF-4944-8B6B-A82B4348CDC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92D12220-840B-4397-889C-9649F34B7E25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AB926B2-077B-4752-80EC-D39446115FCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8C1D750-1FE9-40F8-BCB9-77D13C13906C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07040D2-2ADC-4CC4-860F-74A7C64FD6FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BF12F06-D672-40BF-B7A6-1DA3711136F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59D80E8-5A2C-402F-8AE3-766ECEDA14F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F66D2E5-BD5B-406D-82A0-4E1E32EDC337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"557E240A-6760-434E-9C3A-1E5E9129912D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D196C46-0F17-4C42-A232-B12CE85D9641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3B40170-C992-4386-8429-52A216F64384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C71A52C1-1FBF-4730-8234-700F87D5E74D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9219B34E-F94C-4ECA-85E5-850EBD0F41A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B930DF9-C425-41AF-9736-0BD611C79CA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCD02FD9-8E63-4B79-8878-07C4316981C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B84F7DC-EE67-4748-8AE2-7070A6F79BAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D78A1CFF-F05E-429C-A9AA-935078574A3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE28AD41-2287-4F2B-924C-30B66A320443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E31FFECA-F663-4B59-9800-1C6A8BD84626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F194D4-9425-470E-B812-CD92B5C5A68A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E426811-F97D-42CE-B06D-41CDA84E1B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F5F5950-C21F-4142-BA1E-E074FAF249F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30EE6B10-84FC-4D9D-8F39-4B7000CC85AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFDA5D5-F00F-40CC-B492-C433200A491C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA7061E-E26C-4905-AB41-18267DD32821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFC055D-B249-4EB4-8A9F-BE4391A27505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F91FC3-CF90-450D-9E71-4A301A997921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"739731E7-F1BF-4D12-B103-E7F85B35307E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1C36BE-D4DC-4965-8106-EDA77BDB64DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B85362-44E5-4107-AC8A-29DEE2A7EEDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63293B85-A014-4F23-97EE-6CE3467FCB06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"708D6E00-A2E5-4B08-88E7-C872ACFC341D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD8EE0E-2BA3-49DD-91D1-81AB67F16475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC75E5CF-4241-45A8-AD45-1F7F077CEEA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D132291B-AADD-49E3-ADD6-333E1F1D8DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ADF328B-D286-4C36-9F21-11A58D55D03A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D23470-A702-426D-A63C-4F7BAC158762\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"750A77C5-1367-4E04-9ABF-1AB2D46C29C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1340A29-3428-4FAD-AA07-7F625915E34D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50CC669-9555-45E9-A43B-05A21FB040E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA1FA19-A836-4D6A-8C2D-718ECE6866D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECEBDB0-2E0A-416B-9737-82C1FC65A06C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C39B6A99-7060-4011-8FA3-E5ABE5C02813\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF9E723E-1095-424E-A90D-380CA0D2795E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35380FB9-90FF-405F-8E2E-01C1DD209540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2215D655-0EA9-4530-AB68-7B1C7360D692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"020B6FED-EAE2-478C-8FF4-CB75F24E9A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE519C62-F5BB-461C-91EF-2979CD506C63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F693457C-3529-4E62-A672-1B862F235D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC838E74-665C-4FE3-8F82-8DB2A3B1DEA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"725E953B-CD85-4451-8D18-40E8D80479AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196C11A9-1A63-49A0-918F-4A3F9293FAF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5A42E1-5CC9-4165-8809-69FB6DF12AD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C753C7B-BB62-41C9-BF21-8C653B433FAE\"}]}]}],\"references\":[{\"url\":\"https://security.netapp.com/advisory/ntap-20220210-0008/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220210-0008/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", }, }
gsd-2021-0127
Vulnerability from gsd
{ GSD: { alias: "CVE-2021-0127", description: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.", id: "GSD-2021-0127", references: [ "https://www.suse.com/security/cve/CVE-2021-0127.html", "https://advisories.mageia.org/CVE-2021-0127.html", "https://ubuntu.com/security/CVE-2021-0127", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-0127", ], details: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.", id: "GSD-2021-0127", modified: "2023-12-13T01:23:07.455835Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2021-0127", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Processors", version: { version_data: [ { version_value: "See references", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "denial of service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, { name: "https://security.netapp.com/advisory/ntap-20220210-0008/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6585r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6685r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6157u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6006u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-6098p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6402p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g_:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g7400e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g7400te:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2021-0127", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", refsource: "MISC", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, { name: "https://security.netapp.com/advisory/ntap-20220210-0008/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, }, }, lastModifiedDate: "2022-02-15T21:12Z", publishedDate: "2022-02-09T23:15Z", }, }, }
ghsa-mqcr-p73p-f4gw
Vulnerability from github
Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.
{ affected: [], aliases: [ "CVE-2021-0127", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-02-09T23:15:00Z", severity: "MODERATE", }, details: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.", id: "GHSA-mqcr-p73p-f4gw", modified: "2023-08-08T15:31:43Z", published: "2022-02-11T00:01:00Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-0127", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20220210-0008", }, { type: "WEB", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
ICSA-23-122-01
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { organization: "Mitsubishi Electric", summary: "reporting these vulnerabilities to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of these vulnerabilities could allow a malicious attacker to escalate privileges, disclose parameter information in the affected products, and cause a denial-of-service condition.", title: "Risk evaluation", }, { category: "other", text: "Critical Manufacturing", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "Japan", title: "Company headquarters location", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", title: "Recommended Practices", }, { category: "general", text: "CISA recommends users take the following measures to protect themselves from social engineering attacks:", title: "Recommended Practices", }, { category: "general", text: "Do not click web links or open attachments in unsolicited email messages.", title: "Recommended Practices", }, { category: "general", text: "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", title: "Recommended Practices", }, { category: "general", text: "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", title: "Recommended Practices", }, { category: "general", text: "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", title: "Recommended Practices", }, { category: "general", text: "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "general", text: "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely. These vulnerabilities have a high attack complexity.", title: "Recommended Practices", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "ICS Advisory ICSA-23-122-01 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-122-01.json", }, { category: "self", summary: "ICS Advisory ICSA-23-122-01 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-23-122-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ncas/tips/ST04-014", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/ics/Recommended-Practices", }, { category: "external", summary: "Recommended Practices", url: "https://cisa.gov/ics", }, ], title: "Mitsubishi Electric Factory Automation Products", tracking: { current_release_date: "2023-05-02T18:41:30.488188Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-23-122-01", initial_release_date: "2023-05-02T18:41:30.488188Z", revision_history: [ { date: "2023-05-02T18:41:30.488188Z", legacy_version: "1", number: "1", summary: "CSAF Creation Date", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELIPC MI5122-VM: *", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "MELIPC MI5122-VM", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELIPC MI1002-W: *", product_id: "CSAFPID-0002", }, }, ], category: "product_name", name: "MELIPC MI1002-W", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELIPC MI2012-W: *", product_id: "CSAFPID-0003", }, }, ], category: "product_name", name: "MELIPC MI2012-W", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELIPC MI3321G-W: *", product_id: "CSAFPID-0004", }, }, ], category: "product_name", name: "MELIPC MI3321G-W", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELIPC MI3315G-W: *", product_id: "CSAFPID-0005", }, }, ], category: "product_name", name: "MELIPC MI3315G-W", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELSEC iQ-R R102WCPU-W: *", product_id: "CSAFPID-0006", }, }, ], category: "product_name", name: "MELSEC iQ-R R102WCPU-W", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELSEC Q Q24DHCCPU-V: *", product_id: "CSAFPID-0007", }, }, ], category: "product_name", name: "MELSEC Q Q24DHCCPU-V", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELSEC Q Q24DHCCPU-VG: *", product_id: "CSAFPID-0008", }, }, ], category: "product_name", name: "MELSEC Q Q24DHCCPU-VG", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELSEC Q Q24DHCCPU-LS: *", product_id: "CSAFPID-0009", }, }, ], category: "product_name", name: "MELSEC Q Q24DHCCPU-LS", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELSEC Q Q26DHCCPU-LS: *", product_id: "CSAFPID-00010", }, }, ], category: "product_name", name: "MELSEC Q Q26DHCCPU-LS", }, ], category: "vendor", name: "Mitsubishi Electric", }, ], }, vulnerabilities: [ { cve: "CVE-2022-0002", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2022-0002 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0002", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2022-0002 - INTEL-SA-00598", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html?wapkw=CVE-2022-0002", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2021-33150", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. CVE-2021-33150 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33150", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2021-33150 - INTEL-SA-00609", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00609.html?wapkw=CVE-2021-33150", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2021-0127", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. CVE-2021-0127 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-0127", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2021-0127 - INTEL-SA-00532", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html?wapkw=CVE-2021-0127", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2021-0086", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Observable response discrepancy in floating-point operations for some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2021-0086 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-0086", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2021-0086 - INTEL-SA-00516", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2021-0089", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2021-0089 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-0089", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2021-0089 - INTEL-SA-00516", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2021-0146", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. CVE-2021-0146 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-0146", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2021-0146 - INTEL-SA-00528", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2020-24512", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. CVE-2020-24512 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2020-24512 - INTEL-SA-00464", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html?wapkw=CVE-2020-24512", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2020-8670", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2020-8670 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-8670", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2020-8670 — INTEL-SA-00463", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html?wapkw=CVE-2020-8670", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2020-24489", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. CVE-2020-24489 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2020-24489 - INTEL-SA-00442", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html?wapkw=CVE-2020-24489", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, ], }
icsa-23-122-01
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { organization: "Mitsubishi Electric", summary: "reporting these vulnerabilities to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of these vulnerabilities could allow a malicious attacker to escalate privileges, disclose parameter information in the affected products, and cause a denial-of-service condition.", title: "Risk evaluation", }, { category: "other", text: "Critical Manufacturing", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "Japan", title: "Company headquarters location", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", title: "Recommended Practices", }, { category: "general", text: "CISA recommends users take the following measures to protect themselves from social engineering attacks:", title: "Recommended Practices", }, { category: "general", text: "Do not click web links or open attachments in unsolicited email messages.", title: "Recommended Practices", }, { category: "general", text: "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", title: "Recommended Practices", }, { category: "general", text: "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", title: "Recommended Practices", }, { category: "general", text: "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", title: "Recommended Practices", }, { category: "general", text: "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "general", text: "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely. These vulnerabilities have a high attack complexity.", title: "Recommended Practices", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "ICS Advisory ICSA-23-122-01 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-122-01.json", }, { category: "self", summary: "ICS Advisory ICSA-23-122-01 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-23-122-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ncas/tips/ST04-014", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/ics/Recommended-Practices", }, { category: "external", summary: "Recommended Practices", url: "https://cisa.gov/ics", }, ], title: "Mitsubishi Electric Factory Automation Products", tracking: { current_release_date: "2023-05-02T18:41:30.488188Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-23-122-01", initial_release_date: "2023-05-02T18:41:30.488188Z", revision_history: [ { date: "2023-05-02T18:41:30.488188Z", legacy_version: "1", number: "1", summary: "CSAF Creation Date", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELIPC MI5122-VM: *", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "MELIPC MI5122-VM", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELIPC MI1002-W: *", product_id: "CSAFPID-0002", }, }, ], category: "product_name", name: "MELIPC MI1002-W", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELIPC MI2012-W: *", product_id: "CSAFPID-0003", }, }, ], category: "product_name", name: "MELIPC MI2012-W", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELIPC MI3321G-W: *", product_id: "CSAFPID-0004", }, }, ], category: "product_name", name: "MELIPC MI3321G-W", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELIPC MI3315G-W: *", product_id: "CSAFPID-0005", }, }, ], category: "product_name", name: "MELIPC MI3315G-W", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELSEC iQ-R R102WCPU-W: *", product_id: "CSAFPID-0006", }, }, ], category: "product_name", name: "MELSEC iQ-R R102WCPU-W", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELSEC Q Q24DHCCPU-V: *", product_id: "CSAFPID-0007", }, }, ], category: "product_name", name: "MELSEC Q Q24DHCCPU-V", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELSEC Q Q24DHCCPU-VG: *", product_id: "CSAFPID-0008", }, }, ], category: "product_name", name: "MELSEC Q Q24DHCCPU-VG", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELSEC Q Q24DHCCPU-LS: *", product_id: "CSAFPID-0009", }, }, ], category: "product_name", name: "MELSEC Q Q24DHCCPU-LS", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "MELSEC Q Q26DHCCPU-LS: *", product_id: "CSAFPID-00010", }, }, ], category: "product_name", name: "MELSEC Q Q26DHCCPU-LS", }, ], category: "vendor", name: "Mitsubishi Electric", }, ], }, vulnerabilities: [ { cve: "CVE-2022-0002", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2022-0002 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0002", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2022-0002 - INTEL-SA-00598", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html?wapkw=CVE-2022-0002", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2021-33150", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. CVE-2021-33150 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33150", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2021-33150 - INTEL-SA-00609", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00609.html?wapkw=CVE-2021-33150", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2021-0127", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. CVE-2021-0127 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-0127", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2021-0127 - INTEL-SA-00532", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html?wapkw=CVE-2021-0127", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2021-0086", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Observable response discrepancy in floating-point operations for some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2021-0086 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-0086", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2021-0086 - INTEL-SA-00516", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2021-0089", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2021-0089 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-0089", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2021-0089 - INTEL-SA-00516", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2021-0146", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. CVE-2021-0146 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-0146", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2021-0146 - INTEL-SA-00528", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2020-24512", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. CVE-2020-24512 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2020-24512 - INTEL-SA-00464", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html?wapkw=CVE-2020-24512", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2020-8670", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2020-8670 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-8670", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2020-8670 — INTEL-SA-00463", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html?wapkw=CVE-2020-8670", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, { cve: "CVE-2020-24489", cwe: { id: "CWE-1395", name: "Dependency on Vulnerable Third-Party Component", }, notes: [ { category: "summary", text: "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. CVE-2020-24489 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, references: [ { category: "external", summary: "nvd.nist.gov", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "CVE-2020-24489 - INTEL-SA-00442", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html?wapkw=CVE-2020-24489", }, { category: "vendor_fix", details: "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "Restrict physical access to the product from unauthorized users.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, { category: "vendor_fix", details: "For additional information, refer to Mitsubishi Electric’s bulletin.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", ], }, ], }, ], }
var-202202-0094
Vulnerability from variot
Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. plural Intel(R) Processor There is an unspecified vulnerability in the firmware.Denial of service (DoS) It may be put into a state. ========================================================================== Ubuntu Security Notice USN-5535-1 July 28, 2022
Intel Microcode vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
Several security issues were fixed in Intel Microcode.
Software Description: - intel-microcode: Processor microcode for Intel CPUs
Details:
Joseph Nuzman discovered that some Intel processors did not properly initialise shared resources. A local attacker could use this to obtain sensitive information. (CVE-2021-0145)
Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel processors did not prevent test and debug logic from being activated at runtime. A local attacker could use this to escalate privileges. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-0127)
It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123, CVE-2022-21127)
It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125)
Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that some Intel processors improperly optimised security-critical code. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21151)
It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166)
It was discovered that some Intel processors did not properly restrict access in some situations. A local attacker could use this to obtain sensitive information. (CVE-2021-33117)
Brandon Miller discovered that some Intel processors did not properly restrict access in some situations. A local attacker could use this to obtain sensitive information or a remote attacker could use this to cause a denial of service (system crash). (CVE-2021-33120)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 ESM: intel-microcode 3.20220510.0ubuntu0.16.04.1+esm1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-5535-1 CVE-2021-0127, CVE-2021-0145, CVE-2021-0146, CVE-2021-33117, CVE-2021-33120, CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21151, CVE-2022-21166 . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202402-22
https://security.gentoo.org/
Severity: High Title: intel-microcode: Multiple Vulnerabilities Date: February 19, 2024 Bugs: #832985, #894474 ID: 202402-22
Synopsis
Multiple vulnerabilities have been discovered in intel-microcode, the worst of which can lead to privilege escalation.
Background
Intel IA32/IA64 microcode update data.
Affected packages
Package Vulnerable Unaffected
sys-firmware/intel-microcode < 20230214_p20230212 >= 20230214_p20230212
Description
Multiple vulnerabilities have been discovered in NVIDIA Drivers. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All intel-microcode users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-firmware/intel-microcode-20230214_p20230212"
References
[ 1 ] CVE-2021-0127 https://nvd.nist.gov/vuln/detail/CVE-2021-0127 [ 2 ] CVE-2021-0146 https://nvd.nist.gov/vuln/detail/CVE-2021-0146
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202402-22
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0094", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "core i7-8706g", scope: "eq", trust: 2, vendor: "intel", version: null, }, { model: "xeon platinum 8360y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7100t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2254me", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-8250u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10100t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-1120g4", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9100hl", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1567", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6330", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1533n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6138p", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6140", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6700te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g1820", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7320", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-11900kf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9700t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2195", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6238", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2146g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8256", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g3930e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6350hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9900ks", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6152", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8380hl", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6144", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6822eq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1518", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6258r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-1160g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9900kf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g5600", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7820eq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9500", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2334", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8380h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10750h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10305t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1541", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5115", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6142", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8380", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7020u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9920x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10500h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9940x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6148f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9300h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6820hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6262v", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9700f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11600t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6208u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6126t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8559u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2141i", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6100t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g5620", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10210u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5218t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6700hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8665ue", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6500te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11390h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10700", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6560u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9700k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6400", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1505m v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6154", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8164", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7101e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4114", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11700t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10700k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-7920x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1539", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2295", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11370h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1235l v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-11865mre", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1250p", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1585l v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 9282", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-5820k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g5400", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6400te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2254ml", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9900k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10400h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6250l", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6605", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4209t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1245 v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "clustered data ontap", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "core i5-11600k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6254", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10400t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-11100he", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6685r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11700kf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4310t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8358p", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4214y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4215r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2133", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2123", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3323", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g7400te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6267u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6210u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7167u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10400", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-11955m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-1005g1", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-11900f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1140g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2388g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1268l v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6226", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1250e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1145gre", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4114t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-8350u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6320", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10510u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1155g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7360u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6700", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9850he", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-1125g4", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7500t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10710u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6212u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11400f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8358", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6157u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2274g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1390", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1030g4", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 9221", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-1115g4", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8376h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9400", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9100", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3175x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6128", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1350", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-1180g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1553n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11800h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2356g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8168", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9100t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8160t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11260h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8750h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6230t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6650u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6328hl", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2226ge", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6400t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7800x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2314", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11700k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6230r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-1185g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2255", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10500", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7440eq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7660u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6660u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1505l v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10700kf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-11950h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-5930k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6505t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7300u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1557", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10900kf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1577", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1280 v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8176", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8140u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10850k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g3930te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6600u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1035g4", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7920hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10885h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8352s", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1270", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6200u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6209u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8368q", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9500te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-4930k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8362", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-11155mle", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6405t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1515m v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1540", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-3820", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11400", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1270 v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4210", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9800x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2225", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10700t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11600kf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7287u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6244", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8160f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6300", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-11555mle", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3265", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7700t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2124g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10100y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6167u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7600t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7y54", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7567u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g1610", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7y75", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9700kf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6138f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8352m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9300t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10500te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-1000g1", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10810u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6950x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4116t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2145nt", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6126", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9700e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8351n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g1610t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5120t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5218n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5220t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7700hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6246", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8368", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6500t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8268", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4316", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1370p", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6138", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5118", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2155", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11850h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2224g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10310y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2386g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4310", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1370", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g5600t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6230", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8360h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6238t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g5420", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6240y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7600", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10900k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6300t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1290e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10850h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8300", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8569u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-8400", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2142it", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6132", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8705g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g5500t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3225", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3235", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g7400e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon bronze 3104", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11320h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2146nt", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6820eq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9750h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6700t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6130t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2125", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2324g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6400t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g5500", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1585 v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6700k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4216", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6312u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11400h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4208", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10300h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3275m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6400", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10600kf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold 4425y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7600k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6402p", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7102e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9600kf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g7400", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6240r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11500h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10870h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6328h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1535m v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4314", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1623n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8145u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8352y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3365", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6102e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6226r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10700f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8650u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1571", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6150", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9600t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7820hk", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7400", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10900te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1537", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6234", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g1830", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8100h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6770hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6338n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3375", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2183it", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2235", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1622", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6500u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7100u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5222", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6238r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1501l v6", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2145", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1390t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g1820te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1637", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6600", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2276me", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-11855m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-1065g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10105t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9500t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3223", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10600t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold 7505", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8565u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9100e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8850h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2161i", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2278g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-3930k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2174g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5320t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2135", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9350kf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8280l", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8360hl", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6500t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1390p", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7300t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6360u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10400f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2224", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9900x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2123it", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2144g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1531", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6442eq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4109t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6500", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8276l", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4116", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-8600k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8276", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g1630", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11400t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6260u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2136", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10980xe", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7500u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6240l", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-1115g4e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-3960x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10110y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10310u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6354", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7y57", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8300t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1230 v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-1195g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6300u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3265m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-11900h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10500e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1035g1", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold 4415y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8160", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6342", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9400f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8100t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6248r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7700k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8354h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2245", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2186g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10325", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2226g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 9222", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-4930mx", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1501m v6", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-11980hk", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2278gel", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6256", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10100e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7400t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9850h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6100e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6900k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8700t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-11900k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10100te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6600k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6330n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1528", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8376hl", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8350k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-7940x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-1115gre", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6250", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7300", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1558l v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6100", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10200h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6850k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1145g7e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10300", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9880h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6348", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1633n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4214", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5215l", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8156", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2286m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8153", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1290", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6870hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1275 v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10900e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9300hf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10900f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1135g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10500t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-4940mx", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold 4415u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4309y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold 6500y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-3970x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g5420t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1559", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9900t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1653n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1527", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6138t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2286g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2163it", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10105f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10320", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6346", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6600", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11375h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-5960x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3275", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5318h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1260l v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-1185g7e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9350k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6100te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9960x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7350k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8550u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5318y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6230n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g1820t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5315y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6314u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2176g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6970hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6248", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2124", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1270e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7130u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6134", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3245m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4108", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1220 v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8356h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1520", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1030g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6505", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2275", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11600", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10610u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10700e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon bronze 3204", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2378g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1225 v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6130f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2166nt", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6287u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g1620", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10105", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6100h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-1068ng7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6006u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold 5405u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6820hk", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6300hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10875h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10940x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10900t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7100h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-7980xe", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8809g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-7900x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5120", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2175", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8176f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10600k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8100", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6148", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6500", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11300h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7100e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6785r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1290p", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7200u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8170", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10980hk", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7267u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10510y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3345", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9300", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5220s", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6246r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11500", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g7400t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5320h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2278ge", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6126f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6326", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9100f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9980xe", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7560u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1545m v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-1060g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4112", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-11555mre", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6336y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4215", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8665u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7700", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11850he", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1578l v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10100", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6142f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-3920xm", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1523n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6600t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6238l", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7100", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2236", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8100b", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2336", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1240 v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6242r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2265", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5220r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6567u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10300t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1270te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-10885m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9320", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10110u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7500", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8260y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3335", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9500e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8260", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6338t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4210t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2234", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9500f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7260u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-4820k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1035g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6130", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "celeron g1620t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g5400t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11500he", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1240l v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10505", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2378", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6240", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9400t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8700b", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-11865mle", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2177nt", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7440hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6800k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9700te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5215", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1649n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon bronze 3206r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7442eq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9900", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8253", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1290t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 9242", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11700f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8145ue", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2126g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-8305g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2374g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8700k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6100u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-7101te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-3245", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2186m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2276m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1543n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2187nt", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5318s", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6585r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1250", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1250te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold 4410y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1145g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7820x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-11900", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9600k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2176m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5317", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2276g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-2223", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10210y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1565l v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7640x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5318n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6334", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-1000g4", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1290te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon bronze 3106", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1513n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5217", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7740x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-10600", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9850hl", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10920x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9980hk", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6440hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1350p", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-7300hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-1185gre", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11600h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2143it", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-11700", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6405", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2288g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8500y", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8280", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1529", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6252", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-9100te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-7960x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5218b", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5122", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold g6400e", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-10700te", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-6440eq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9750hf", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6252n", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2134", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-4960x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1627", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5320", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8709g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8109u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10900", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-1165g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-1110g4", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8352v", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1548", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8557u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6330h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8260l", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-11155mre", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1130g7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6348h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8180", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8353h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-9700", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6338", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5218r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1521", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-6098p", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-10855m", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8086k", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4210r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7820hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6146", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-3940xm", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10100f", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4110", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2276ml", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2244g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6136", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6242", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold 6405u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e3-1575m v5", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8158", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-11500t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "pentium gold 4417u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-1602", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon d-2173it", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5119t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9400h", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-1038ng7", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-10305", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon silver 4214r", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-6920hq", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-8700", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 6222v", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-11900t", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i3-8130u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5220", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-10900x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon e-2246g", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i7-7600u", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon gold 5218", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i9-9820x", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon w-1270p", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "xeon platinum 8270", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "core i5-9600", scope: "eq", trust: 1, vendor: "intel", version: null, }, { model: "clustered data ontap", scope: null, trust: 0.8, vendor: "netapp", version: null, }, { model: "celeron g1820te", scope: null, trust: 0.8, vendor: "インテル", version: null, }, { model: "celeron g1620", scope: null, trust: 0.8, vendor: "インテル", version: null, }, { model: "celeron g1610", scope: null, trust: 0.8, vendor: "インテル", version: null, }, { model: "celeron g1610t", scope: null, trust: 0.8, vendor: "インテル", version: null, }, { model: "celeron g1620t", scope: null, trust: 0.8, vendor: "インテル", version: null, }, { model: "celeron g1630", scope: null, trust: 0.8, vendor: "インテル", version: null, }, { model: "celeron g1820t", scope: null, trust: 0.8, vendor: "インテル", version: null, }, { model: "celeron g1820", scope: null, trust: 0.8, vendor: "インテル", version: null, }, { model: "ha8000v シリーズ", scope: null, trust: 0.8, vendor: "日立", version: null, }, { model: "celeron g1830", scope: null, trust: 0.8, vendor: "インテル", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-001396", }, { db: "NVD", id: "CVE-2021-0127", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Ubuntu", sources: [ { db: "PACKETSTORM", id: "167553", }, { db: "PACKETSTORM", id: "167862", }, ], trust: 0.2, }, cve: "CVE-2021-0127", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", exploitabilityScore: 3.9, id: "CVE-2021-0127", impactScore: 2.9, integrityImpact: "NONE", severity: "LOW", trust: 1.9, vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", exploitabilityScore: 3.9, id: "VHN-371696", impactScore: 2.9, integrityImpact: "NONE", severity: "LOW", trust: 0.1, vectorString: "AV:L/AC:L/AU:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 1.8, id: "CVE-2021-0127", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 5.5, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2021-0127", impactScore: null, integrityImpact: "None", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2021-0127", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "CVE-2021-0127", trust: 0.8, value: "Medium", }, { author: "CNNVD", id: "CNNVD-202202-655", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-371696", trust: 0.1, value: "LOW", }, { author: "VULMON", id: "CVE-2021-0127", trust: 0.1, value: "LOW", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-371696", }, { db: "VULMON", id: "CVE-2021-0127", }, { db: "JVNDB", id: "JVNDB-2022-001396", }, { db: "CNNVD", id: "CNNVD-202202-655", }, { db: "NVD", id: "CVE-2021-0127", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. plural Intel(R) Processor There is an unspecified vulnerability in the firmware.Denial of service (DoS) It may be put into a state. ==========================================================================\nUbuntu Security Notice USN-5535-1\nJuly 28, 2022\n\nIntel Microcode vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in Intel Microcode. \n\nSoftware Description:\n- intel-microcode: Processor microcode for Intel CPUs\n\nDetails:\n\nJoseph Nuzman discovered that some Intel processors did not properly\ninitialise shared resources. A local attacker could use this to obtain\nsensitive information. (CVE-2021-0145)\n\nMark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel\nprocessors did not prevent test and debug logic from being activated at\nruntime. A local attacker could use this to escalate\nprivileges. A local attacker could use this to cause a denial\nof service (system crash). (CVE-2021-0127)\n\nIt was discovered that some Intel processors did not completely perform\ncleanup actions on multi-core shared buffers. A local attacker could\npossibly use this to expose sensitive information. (CVE-2022-21123,\nCVE-2022-21127)\n\nIt was discovered that some Intel processors did not completely perform\ncleanup actions on microarchitectural fill buffers. A local attacker could\npossibly use this to expose sensitive information. (CVE-2022-21125)\n\nAlysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that\nsome Intel processors improperly optimised security-critical code. A local\nattacker could possibly use this to expose sensitive\ninformation. (CVE-2022-21151)\n\nIt was discovered that some Intel processors did not properly perform\ncleanup during specific special register write operations. A local attacker\ncould possibly use this to expose sensitive information. (CVE-2022-21166)\n\nIt was discovered that some Intel processors did not properly restrict\naccess in some situations. A local attacker could use this to obtain\nsensitive information. (CVE-2021-33117)\n\nBrandon Miller discovered that some Intel processors did not properly\nrestrict access in some situations. A local attacker could use this to\nobtain sensitive information or a remote attacker could use this to\ncause a denial of service (system crash). (CVE-2021-33120)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 ESM:\nintel-microcode 3.20220510.0ubuntu0.16.04.1+esm1\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\nhttps://ubuntu.com/security/notices/USN-5535-1\nCVE-2021-0127, CVE-2021-0145, CVE-2021-0146, CVE-2021-33117,\nCVE-2021-33120, CVE-2022-21123, CVE-2022-21125, CVE-2022-21127,\nCVE-2022-21151, CVE-2022-21166\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202402-22\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: intel-microcode: Multiple Vulnerabilities\n Date: February 19, 2024\n Bugs: #832985, #894474\n ID: 202402-22\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in intel-microcode, the\nworst of which can lead to privilege escalation. \n\nBackground\n==========\n\nIntel IA32/IA64 microcode update data. \n\nAffected packages\n=================\n\nPackage Vulnerable Unaffected\n---------------------------- -------------------- ---------------------\nsys-firmware/intel-microcode < 20230214_p20230212 >= 20230214_p20230212\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in NVIDIA Drivers. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n======\n\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll intel-microcode users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=sys-firmware/intel-microcode-20230214_p20230212\"\n\nReferences\n==========\n\n[ 1 ] CVE-2021-0127\n https://nvd.nist.gov/vuln/detail/CVE-2021-0127\n[ 2 ] CVE-2021-0146\n https://nvd.nist.gov/vuln/detail/CVE-2021-0146\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202402-22\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2024 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", sources: [ { db: "NVD", id: "CVE-2021-0127", }, { db: "JVNDB", id: "JVNDB-2022-001396", }, { db: "VULHUB", id: "VHN-371696", }, { db: "VULMON", id: "CVE-2021-0127", }, { db: "PACKETSTORM", id: "167553", }, { db: "PACKETSTORM", id: "167862", }, { db: "PACKETSTORM", id: "177180", }, ], trust: 2.07, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2021-0127", trust: 3.7, }, { db: "PACKETSTORM", id: "167862", trust: 0.8, }, { db: "PACKETSTORM", id: "167553", trust: 0.8, }, { db: "JVN", id: "JVNVU99045838", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2022-001396", trust: 0.8, }, { db: "AUSCERT", id: "ESB-2023.2479", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.0755", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.0535", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.0833", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.1166", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.6332", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.0739", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3019", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3692", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.0835", trust: 0.6, }, { db: "CS-HELP", id: "SB2022031814", trust: 0.6, }, { db: "CS-HELP", id: "SB2022021007", trust: 0.6, }, { db: "CS-HELP", id: "SB2022062041", trust: 0.6, }, { db: "LENOVO", id: "LEN-77639", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202202-655", trust: 0.6, }, { db: "VULHUB", id: "VHN-371696", trust: 0.1, }, { db: "VULMON", id: "CVE-2021-0127", trust: 0.1, }, { db: "PACKETSTORM", id: "177180", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-371696", }, { db: "VULMON", id: "CVE-2021-0127", }, { db: "JVNDB", id: "JVNDB-2022-001396", }, { db: "PACKETSTORM", id: "167553", }, { db: "PACKETSTORM", id: "167862", }, { db: "PACKETSTORM", id: "177180", }, { db: "CNNVD", id: "CNNVD-202202-655", }, { db: "NVD", id: "CVE-2021-0127", }, ], }, id: "VAR-202202-0094", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-371696", }, ], trust: 0.01, }, last_update_date: "2024-08-14T12:48:52.143000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "hitachi-sec-2022-207", trust: 0.8, url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, { title: "Intel Processors BIOS firmware Enter the fix for the verification error vulnerability", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=182455", }, { title: "Red Hat: CVE-2021-0127", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2021-0127", }, { title: "Ubuntu Security Notice: USN-5486-1: Intel Microcode vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5486-1", }, { title: "Amazon Linux 2: ALAS2-2022-1762", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1762", }, ], sources: [ { db: "VULMON", id: "CVE-2021-0127", }, { db: "JVNDB", id: "JVNDB-2022-001396", }, { db: "CNNVD", id: "CNNVD-202202-655", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-Other", trust: 1, }, { problemtype: "Lack of information (CWE-noinfo) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-001396", }, { db: "NVD", id: "CVE-2021-0127", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, { trust: 1.8, url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, { trust: 1.7, url: "https://nvd.nist.gov/vuln/detail/cve-2021-0127", }, { trust: 0.8, url: "https://jvn.jp/vu/jvnvu99045838/", }, { trust: 0.7, url: "https://access.redhat.com/security/cve/cve-2021-0127", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3019", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/167862/ubuntu-security-notice-usn-5535-1.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.1166", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022031814", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022021007", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2023.2479", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/intel-processor-denial-of-service-via-breakpoint-control-flow-37499", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.6332", }, { trust: 0.6, url: "https://support.lenovo.com/us/en/product_security/len-77639", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.0739", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3692", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.0835", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022062041", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/167553/ubuntu-security-notice-usn-5486-1.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.0833", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.0535", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.0755", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2021-0146", }, { trust: 0.2, url: "https://ubuntu.com/security/notices/usn-5486-1", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-21166", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-33120", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-0145", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-33117", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-21151", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-21127", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.18.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.21.10.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.22.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.20.04.1", }, { trust: 0.1, url: "https://ubuntu.com/security/notices/usn-5535-1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-21125", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-21123", }, { trust: 0.1, url: "https://security.gentoo.org/", }, { trust: 0.1, url: "https://security.gentoo.org/glsa/202402-22", }, { trust: 0.1, url: "https://bugs.gentoo.org.", }, { trust: 0.1, url: "https://creativecommons.org/licenses/by-sa/2.5", }, ], sources: [ { db: "VULHUB", id: "VHN-371696", }, { db: "VULMON", id: "CVE-2021-0127", }, { db: "JVNDB", id: "JVNDB-2022-001396", }, { db: "PACKETSTORM", id: "167553", }, { db: "PACKETSTORM", id: "167862", }, { db: "PACKETSTORM", id: "177180", }, { db: "CNNVD", id: "CNNVD-202202-655", }, { db: "NVD", id: "CVE-2021-0127", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-371696", }, { db: "VULMON", id: "CVE-2021-0127", }, { db: "JVNDB", id: "JVNDB-2022-001396", }, { db: "PACKETSTORM", id: "167553", }, { db: "PACKETSTORM", id: "167862", }, { db: "PACKETSTORM", id: "177180", }, { db: "CNNVD", id: "CNNVD-202202-655", }, { db: "NVD", id: "CVE-2021-0127", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-02-09T00:00:00", db: "VULHUB", id: "VHN-371696", }, { date: "2022-02-09T00:00:00", db: "VULMON", id: "CVE-2021-0127", }, { date: "2022-03-09T00:00:00", db: "JVNDB", id: "JVNDB-2022-001396", }, { date: "2022-06-20T16:27:17", db: "PACKETSTORM", id: "167553", }, { date: "2022-07-28T14:56:22", db: "PACKETSTORM", id: "167862", }, { date: "2024-02-19T14:26:17", db: "PACKETSTORM", id: "177180", }, { date: "2022-02-08T00:00:00", db: "CNNVD", id: "CNNVD-202202-655", }, { date: "2022-02-09T23:15:13.817000", db: "NVD", id: "CVE-2021-0127", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-02-15T00:00:00", db: "VULHUB", id: "VHN-371696", }, { date: "2022-02-15T00:00:00", db: "VULMON", id: "CVE-2021-0127", }, { date: "2022-03-09T03:20:00", db: "JVNDB", id: "JVNDB-2022-001396", }, { date: "2023-05-04T00:00:00", db: "CNNVD", id: "CNNVD-202202-655", }, { date: "2023-08-08T14:21:49.707000", db: "NVD", id: "CVE-2021-0127", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "PACKETSTORM", id: "167553", }, { db: "PACKETSTORM", id: "167862", }, { db: "CNNVD", id: "CNNVD-202202-655", }, ], trust: 0.8, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Intel(R) Processor Firmware vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2022-001396", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-202202-655", }, ], trust: 0.6, }, }
WID-SEC-W-2022-0391
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Prozessor ist das zentrale Rechenwerk eines Computers.\r\nProLiant ist eine Serverfamilie von Hewlett Packard Enterprise.\r\nSynergy ist eine kombinierbare Blade-Infrastruktur, die Workloads in einer Hybrid Cloud-Umgebung unterstützt.\r\nLenovo ist ein Hersteller u. a. von Computern.\r\nDas BIOS ist die Firmware bei IBM PC kompatiblen Computern.\r\nCitrix Hypervisor ist eine Plattform für Desktop-, Server- und Cloud-Virtualisierungsinfrastrukturen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um einen Denial of Service Angriff durchzuführen und vertrauliche Informationen offenzulegen.", title: "Angriff", }, { category: "general", text: "- NetApp Appliance\n- BIOS/Firmware\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0391 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0391.json", }, { category: "self", summary: "WID-SEC-2022-0391 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0391", }, { category: "external", summary: "Lenovo Security Advisory vom 2022-02-08", url: "https://support.lenovo.com/us/en/product_security/LEN-77639", }, { category: "external", summary: "Citrix Security Advisory vom 2022-02-08", url: "https://support.citrix.com/article/CTX337526", }, { category: "external", summary: "Intel Security Advisory vom 2022-02-08", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, { category: "external", summary: "Intel Security Advisory vom 2022-02-08", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html", }, { category: "external", summary: "Intel Security Advisory vom 2022-02-08", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html", }, { category: "external", summary: "HPE Security Advisory vom 2022-02-08", url: "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739&elq_cid=67018031&docId=hpesbhf04244en_us", }, { category: "external", summary: "NetApp Security Advisory NTAP-20220210-0008 vom 2022-02-14", url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0502-1 vom 2022-02-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0541-1 vom 2022-02-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0575-1 vom 2022-02-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0574-1 vom 2022-02-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0576-1 vom 2022-02-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html", }, { category: "external", summary: "HPE Security Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739&elq_cid=67018031&docId=hpesbhf04244en_us", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1762 vom 2022-03-09", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1762.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5486-1 vom 2022-06-20", url: "https://ubuntu.com/security/notices/USN-5486-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5535-1 vom 2022-07-28", url: "https://ubuntu.com/security/notices/USN-5535-1", }, { category: "external", summary: "IBM Security Bulletin 6845359 vom 2022-12-06", url: "https://www.ibm.com/support/pages/node/6845359", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202402-22 vom 2024-02-19", url: "https://security.gentoo.org/glsa/202402-22", }, ], source_lang: "en-US", title: "Intel Prozessoren: Mehrere Schwachstellen", tracking: { current_release_date: "2024-02-18T23:00:00.000+00:00", generator: { date: "2024-08-15T17:28:51.363+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0391", initial_release_date: "2022-02-08T23:00:00.000+00:00", revision_history: [ { date: "2022-02-08T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-02-13T23:00:00.000+00:00", number: "2", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2022-02-20T23:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-02-21T23:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-02-27T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-03-06T23:00:00.000+00:00", number: "6", summary: "Neue Updates aufgenommen", }, { date: "2022-03-08T23:00:00.000+00:00", number: "7", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-06-19T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-07-28T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-12-05T23:00:00.000+00:00", number: "10", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-02-18T23:00:00.000+00:00", number: "11", summary: "Neue Updates von Gentoo aufgenommen", }, ], status: "final", version: "11", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Citrix Systems Hypervisor", product: { name: "Citrix Systems Hypervisor", product_id: "T016872", product_identification_helper: { cpe: "cpe:/o:citrix:hypervisor:-", }, }, }, ], category: "vendor", name: "Citrix Systems", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "HPE ProLiant", product: { name: "HPE ProLiant", product_id: "T009310", product_identification_helper: { cpe: "cpe:/h:hp:proliant:-", }, }, }, { category: "product_name", name: "HPE Synergy", product: { name: "HPE Synergy", product_id: "T019820", product_identification_helper: { cpe: "cpe:/h:hpe:synergy:-", }, }, }, ], category: "vendor", name: "HPE", }, { branches: [ { category: "product_name", name: "IBM QRadar SIEM", product: { name: "IBM QRadar SIEM", product_id: "T021415", product_identification_helper: { cpe: "cpe:/a:ibm:qradar_siem:-", }, }, }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Intel Prozessor", product: { name: "Intel Prozessor", product_id: "T011586", product_identification_helper: { cpe: "cpe:/h:intel:intel_prozessor:-", }, }, }, ], category: "vendor", name: "Intel", }, { branches: [ { category: "product_name", name: "Lenovo BIOS", product: { name: "Lenovo BIOS", product_id: "T005651", product_identification_helper: { cpe: "cpe:/h:lenovo:bios:-", }, }, }, { category: "product_name", name: "Lenovo Computer", product: { name: "Lenovo Computer", product_id: "T006520", product_identification_helper: { cpe: "cpe:/o:lenovo:lenovo_computer:-", }, }, }, ], category: "vendor", name: "Lenovo", }, { branches: [ { category: "product_name", name: "NetApp Data ONTAP", product: { name: "NetApp Data ONTAP", product_id: "7654", product_identification_helper: { cpe: "cpe:/a:netapp:data_ontap:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2021-0127", notes: [ { category: "description", text: "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgemäßen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs außerhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "T005651", "T006520", "T019820", "T002207", "T000126", "T021415", "7654", "T011586", "398363", "T012167", "T016872", "T009310", ], }, release_date: "2022-02-08T23:00:00.000+00:00", title: "CVE-2021-0127", }, { cve: "CVE-2021-0145", notes: [ { category: "description", text: "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgemäßen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs außerhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "T005651", "T006520", "T019820", "T002207", "T000126", "T021415", "7654", "T011586", "398363", "T012167", "T016872", "T009310", ], }, release_date: "2022-02-08T23:00:00.000+00:00", title: "CVE-2021-0145", }, { cve: "CVE-2021-33120", notes: [ { category: "description", text: "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgemäßen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs außerhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "T005651", "T006520", "T019820", "T002207", "T000126", "T021415", "7654", "T011586", "398363", "T012167", "T016872", "T009310", ], }, release_date: "2022-02-08T23:00:00.000+00:00", title: "CVE-2021-33120", }, ], }
wid-sec-w-2022-0391
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Prozessor ist das zentrale Rechenwerk eines Computers.\r\nProLiant ist eine Serverfamilie von Hewlett Packard Enterprise.\r\nSynergy ist eine kombinierbare Blade-Infrastruktur, die Workloads in einer Hybrid Cloud-Umgebung unterstützt.\r\nLenovo ist ein Hersteller u. a. von Computern.\r\nDas BIOS ist die Firmware bei IBM PC kompatiblen Computern.\r\nCitrix Hypervisor ist eine Plattform für Desktop-, Server- und Cloud-Virtualisierungsinfrastrukturen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um einen Denial of Service Angriff durchzuführen und vertrauliche Informationen offenzulegen.", title: "Angriff", }, { category: "general", text: "- NetApp Appliance\n- BIOS/Firmware\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0391 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0391.json", }, { category: "self", summary: "WID-SEC-2022-0391 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0391", }, { category: "external", summary: "Lenovo Security Advisory vom 2022-02-08", url: "https://support.lenovo.com/us/en/product_security/LEN-77639", }, { category: "external", summary: "Citrix Security Advisory vom 2022-02-08", url: "https://support.citrix.com/article/CTX337526", }, { category: "external", summary: "Intel Security Advisory vom 2022-02-08", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, { category: "external", summary: "Intel Security Advisory vom 2022-02-08", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html", }, { category: "external", summary: "Intel Security Advisory vom 2022-02-08", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html", }, { category: "external", summary: "HPE Security Advisory vom 2022-02-08", url: "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739&elq_cid=67018031&docId=hpesbhf04244en_us", }, { category: "external", summary: "NetApp Security Advisory NTAP-20220210-0008 vom 2022-02-14", url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0502-1 vom 2022-02-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0541-1 vom 2022-02-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0575-1 vom 2022-02-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0574-1 vom 2022-02-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0576-1 vom 2022-02-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html", }, { category: "external", summary: "HPE Security Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739&elq_cid=67018031&docId=hpesbhf04244en_us", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1762 vom 2022-03-09", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1762.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5486-1 vom 2022-06-20", url: "https://ubuntu.com/security/notices/USN-5486-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5535-1 vom 2022-07-28", url: "https://ubuntu.com/security/notices/USN-5535-1", }, { category: "external", summary: "IBM Security Bulletin 6845359 vom 2022-12-06", url: "https://www.ibm.com/support/pages/node/6845359", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202402-22 vom 2024-02-19", url: "https://security.gentoo.org/glsa/202402-22", }, ], source_lang: "en-US", title: "Intel Prozessoren: Mehrere Schwachstellen", tracking: { current_release_date: "2024-02-18T23:00:00.000+00:00", generator: { date: "2024-08-15T17:28:51.363+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0391", initial_release_date: "2022-02-08T23:00:00.000+00:00", revision_history: [ { date: "2022-02-08T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-02-13T23:00:00.000+00:00", number: "2", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2022-02-20T23:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-02-21T23:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-02-27T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-03-06T23:00:00.000+00:00", number: "6", summary: "Neue Updates aufgenommen", }, { date: "2022-03-08T23:00:00.000+00:00", number: "7", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-06-19T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-07-28T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-12-05T23:00:00.000+00:00", number: "10", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-02-18T23:00:00.000+00:00", number: "11", summary: "Neue Updates von Gentoo aufgenommen", }, ], status: "final", version: "11", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Citrix Systems Hypervisor", product: { name: "Citrix Systems Hypervisor", product_id: "T016872", product_identification_helper: { cpe: "cpe:/o:citrix:hypervisor:-", }, }, }, ], category: "vendor", name: "Citrix Systems", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "HPE ProLiant", product: { name: "HPE ProLiant", product_id: "T009310", product_identification_helper: { cpe: "cpe:/h:hp:proliant:-", }, }, }, { category: "product_name", name: "HPE Synergy", product: { name: "HPE Synergy", product_id: "T019820", product_identification_helper: { cpe: "cpe:/h:hpe:synergy:-", }, }, }, ], category: "vendor", name: "HPE", }, { branches: [ { category: "product_name", name: "IBM QRadar SIEM", product: { name: "IBM QRadar SIEM", product_id: "T021415", product_identification_helper: { cpe: "cpe:/a:ibm:qradar_siem:-", }, }, }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Intel Prozessor", product: { name: "Intel Prozessor", product_id: "T011586", product_identification_helper: { cpe: "cpe:/h:intel:intel_prozessor:-", }, }, }, ], category: "vendor", name: "Intel", }, { branches: [ { category: "product_name", name: "Lenovo BIOS", product: { name: "Lenovo BIOS", product_id: "T005651", product_identification_helper: { cpe: "cpe:/h:lenovo:bios:-", }, }, }, { category: "product_name", name: "Lenovo Computer", product: { name: "Lenovo Computer", product_id: "T006520", product_identification_helper: { cpe: "cpe:/o:lenovo:lenovo_computer:-", }, }, }, ], category: "vendor", name: "Lenovo", }, { branches: [ { category: "product_name", name: "NetApp Data ONTAP", product: { name: "NetApp Data ONTAP", product_id: "7654", product_identification_helper: { cpe: "cpe:/a:netapp:data_ontap:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2021-0127", notes: [ { category: "description", text: "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgemäßen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs außerhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "T005651", "T006520", "T019820", "T002207", "T000126", "T021415", "7654", "T011586", "398363", "T012167", "T016872", "T009310", ], }, release_date: "2022-02-08T23:00:00.000+00:00", title: "CVE-2021-0127", }, { cve: "CVE-2021-0145", notes: [ { category: "description", text: "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgemäßen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs außerhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "T005651", "T006520", "T019820", "T002207", "T000126", "T021415", "7654", "T011586", "398363", "T012167", "T016872", "T009310", ], }, release_date: "2022-02-08T23:00:00.000+00:00", title: "CVE-2021-0145", }, { cve: "CVE-2021-33120", notes: [ { category: "description", text: "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgemäßen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs außerhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "T005651", "T006520", "T019820", "T002207", "T000126", "T021415", "7654", "T011586", "398363", "T012167", "T016872", "T009310", ], }, release_date: "2022-02-08T23:00:00.000+00:00", title: "CVE-2021-33120", }, ], }
fkie_cve-2021-0127
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", matchCriteriaId: "1FE996B1-6951-4F85-AA58-B99A379D2163", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*", matchCriteriaId: "4003B029-36AE-47CD-BFB1-1F06DFEBA0C6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*", matchCriteriaId: "FADF19F8-54BB-4BF4-BF1C-515EBBEE2060", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*", matchCriteriaId: "B67D44E3-F8E1-4EB9-8D91-5777DC97D497", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*", matchCriteriaId: "0E4AC5E9-94DB-4970-BE29-747503AE81E4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*", matchCriteriaId: "06FFA194-E200-4F4D-8E66-60D0134184E2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*", matchCriteriaId: "12FD8D3B-0FC0-4E8A-9476-3092BAE9F15E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*", matchCriteriaId: "B950F6FC-2848-45B7-9C28-B0DF46BC442B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*", matchCriteriaId: "ABDC4948-B063-4327-890A-C8D9F955C7B9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*", matchCriteriaId: "95101653-A2BF-47F5-A209-097CA98A91F2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*", matchCriteriaId: "226CBC16-EC2A-4498-ADB3-655A0E9CF396", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*", matchCriteriaId: "B9278297-5E4B-40D0-8782-E5AE87E43B7B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", matchCriteriaId: "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", matchCriteriaId: "EF64D95C-653A-4864-A572-CD0A64B6CDF3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", matchCriteriaId: "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", matchCriteriaId: "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", matchCriteriaId: "7F751905-287E-47EA-93B8-2BA576052AAC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", matchCriteriaId: "614B1B4E-E1D7-417F-86D1-92F75D597E36", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", matchCriteriaId: "4BD11E86-B786-43C8-9B67-8F680CC30451", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", matchCriteriaId: "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", matchCriteriaId: "A9963C9F-2D15-479A-A6C1-0C9863904B7E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", matchCriteriaId: "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", matchCriteriaId: "A8B15567-BFEA-43BE-9817-98A1F5548541", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", matchCriteriaId: "984C7C7A-2F8E-4918-8526-64A080943E0E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", matchCriteriaId: "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", matchCriteriaId: "43454510-4BE7-4CD1-960D-AE1B36EFBEA5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", matchCriteriaId: "C7AFC285-2248-45E7-9009-1402628F17E4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", matchCriteriaId: "078DAE1F-8581-44FB-83EA-575685928C4F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", matchCriteriaId: "887BEC29-AD0D-4BEB-B50B-F961629BBF23", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", matchCriteriaId: "93859A03-DE41-4E7B-8646-93925ACBFC42", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", matchCriteriaId: "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", matchCriteriaId: "9877F278-641B-4F83-B420-AB4E1018EA9E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*", matchCriteriaId: "2ABF9AEE-BE1C-40EF-9E5F-6F3641BA7CDE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", matchCriteriaId: "2C60AF0D-983D-454E-8940-209C471DC041", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", matchCriteriaId: "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", matchCriteriaId: "66BAF09D-8199-4579-B25A-E7C5177385E6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", matchCriteriaId: "21EA30AA-713F-40AD-8C94-C1129198EE98", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", matchCriteriaId: "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", matchCriteriaId: "114DF43C-839F-4066-AA30-8DC16B1D6687", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6006u:-:*:*:*:*:*:*:*", matchCriteriaId: "B47568A4-117D-4E76-88DA-F8A4139A83D4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6098p:-:*:*:*:*:*:*:*", matchCriteriaId: "B1F3324D-6E58-4233-A0C4-4F2C058E8D43", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*", matchCriteriaId: "8A6E16A4-5B81-412F-9B02-D15288F0EB52", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*", matchCriteriaId: "8448F47A-F956-4228-9A13-24AE86C532CA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*", matchCriteriaId: "F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*", matchCriteriaId: "78C4115F-E374-47E9-A81F-CC06FA72C67F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*", matchCriteriaId: "AE81958E-5DFA-424C-9662-ECB1D9B738D5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*", matchCriteriaId: "BE0F2403-8146-4CA0-9E89-04022B375CEC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*", matchCriteriaId: "CD67C284-EFCE-4530-8E68-42BB1B6F15C3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6157u:-:*:*:*:*:*:*:*", matchCriteriaId: "2C38AF3E-4547-4CA3-9078-6CBD372331AC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*", matchCriteriaId: "20B1E424-885F-4BB0-9257-8284A18B1655", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*", matchCriteriaId: "BADEBE08-1478-4B88-9E06-5164BA0517DE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*", matchCriteriaId: "4D672383-B9AD-466E-8D6C-68DEC432B9A8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*", matchCriteriaId: "D16BDFF3-4CC0-4423-8385-C5E49C941F49", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", matchCriteriaId: "35F2CA68-9EEA-421F-A92E-E7685EC010EF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*", matchCriteriaId: "EC9F763B-B469-42DC-952F-48448121373F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", matchCriteriaId: "4C17DCC3-9200-4198-B08D-EAD531B59995", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", matchCriteriaId: "31CBD3FB-0835-4F28-BFA2-3D07459066F3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*", matchCriteriaId: "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", matchCriteriaId: "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", matchCriteriaId: "1B6B298A-1480-41C2-BE7C-7291E7256D7C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", matchCriteriaId: "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", matchCriteriaId: "14C20D2A-CD26-4019-A266-AB4E89EBD2E1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", matchCriteriaId: "B608F333-BD78-4082-B2AE-0F5BBE7E0D9A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", matchCriteriaId: "6F609E73-203F-45B9-9A3A-DC754B33860A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*", matchCriteriaId: "7E3A734E-973B-4904-A905-51E438879B8F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*", matchCriteriaId: "9CF355B2-A5D6-41CC-8404-2B61A594BA6D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*", matchCriteriaId: "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*", matchCriteriaId: "5E86321B-B1BD-43B7-A7F5-05CABE35F40E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", matchCriteriaId: "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", matchCriteriaId: "4A504EF6-8F7D-4839-B16D-FDCBD3B22287", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", matchCriteriaId: "47B28199-5B9A-4AC4-9529-77A6FC591DC9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", matchCriteriaId: "33B0B0C9-54ED-4D7E-B0F2-C87690056800", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", matchCriteriaId: "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", matchCriteriaId: "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", matchCriteriaId: "25227F52-7398-4E68-A973-B9177886BE0E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", matchCriteriaId: "0D78093B-076C-48FB-A224-F94F5743ACF3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", matchCriteriaId: "B230FB82-C498-4118-97D3-3835CB713E87", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", matchCriteriaId: "B8127E47-6082-4313-B310-1C6278471A21", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", matchCriteriaId: "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*", matchCriteriaId: "89E9DCEC-6AFD-476F-93A1-E19BFC124BD9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*", matchCriteriaId: "5523F4AF-8CCF-41B1-ADC8-D8363CE0A9D9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*", matchCriteriaId: "53F1B439-37B2-4425-8359-D3C86CD76BBE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*", matchCriteriaId: "6A121388-F0FF-420E-98E2-B6F4B53FF88F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*", matchCriteriaId: "D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*", matchCriteriaId: "B83D5E36-BCA6-47A6-9C78-5A5FAD89F95F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*", matchCriteriaId: "5CA88723-29A0-4F7C-BED3-70E35F913384", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*", matchCriteriaId: "85B0AC6F-52DC-4697-A29A-B4DE51B41D57", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*", matchCriteriaId: "64206B12-9CB6-4E4F-9200-EE062693FC9E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*", matchCriteriaId: "98752CBB-B870-4DA2-BF09-0A6A847E7F19", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA7EEBF-ED6E-4838-ADAE-0D7BA4E65867", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", matchCriteriaId: "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", matchCriteriaId: "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", matchCriteriaId: "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", matchCriteriaId: "403E8A3A-28C2-4329-BF31-1A530E317959", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", matchCriteriaId: "F5F6F725-217C-48FF-86DD-E91A24156121", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", matchCriteriaId: "365696BF-CE3D-4CE6-92A8-413DDE43774E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", matchCriteriaId: "D6F3DE58-EC72-429F-A223-F2027D2828AB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", matchCriteriaId: "C8515D29-3823-4F9B-9578-8BB52336A2A7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", matchCriteriaId: "BE048AEB-094D-4102-9DBF-488FEB53FF89", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", matchCriteriaId: "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", matchCriteriaId: "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", matchCriteriaId: "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", matchCriteriaId: "4BF497A0-30BC-42A4-A000-C0D564D4872A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", matchCriteriaId: "B3025301-52D3-43D7-B6AB-F3F0A5C882DC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", matchCriteriaId: "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", matchCriteriaId: "9466A6CC-8D69-4EB5-94E2-611297120462", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", matchCriteriaId: "B2D116C4-698B-45BC-8622-87E142B37922", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", matchCriteriaId: "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", matchCriteriaId: "4DCA6E61-F1C9-4629-9068-545B19CF95E1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", matchCriteriaId: "36836EB0-99DD-4217-9182-1E9FC5656C42", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", matchCriteriaId: "CD507601-CD6D-4F11-A4A7-790FB740B401", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", matchCriteriaId: "A8C26205-C602-46F6-B611-424709325D6C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", matchCriteriaId: "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", matchCriteriaId: "1940F59A-67FD-45F9-9C78-51A50687628F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", matchCriteriaId: "4B722E2A-1262-44FD-8F7C-F9A9A5C78744", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", matchCriteriaId: "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", matchCriteriaId: "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", matchCriteriaId: "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", matchCriteriaId: "158CC66D-32E5-4396-8E5D-4D90EE9AB62C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", matchCriteriaId: "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", matchCriteriaId: "E84F0381-296A-408E-90D4-A316EE894A9D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", matchCriteriaId: "092E3E45-5F58-412F-BAC9-C3B5290D8349", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", matchCriteriaId: "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", matchCriteriaId: "B6FCAFC0-EEE2-43E4-AE90-1803588B5689", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", matchCriteriaId: "A8640175-3BC2-4C7B-A5A3-51E5677EDECA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", matchCriteriaId: "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", matchCriteriaId: "53D902B5-D135-4961-AED9-EA6DF06534B8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", matchCriteriaId: "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", matchCriteriaId: "B858B433-9DA0-4224-B94C-4962FB3A4138", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", matchCriteriaId: "9F6B5FC3-8E55-430A-A55A-AF541690C576", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", matchCriteriaId: "55568460-F318-48FB-90E4-55CBBAF13E59", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*", matchCriteriaId: "0242C717-1C3F-4D9E-B068-F3102A40E6A8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", matchCriteriaId: "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB84973-3DAC-4458-A817-943302F5EFF7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", matchCriteriaId: "1B26C730-32FA-4D51-88FA-E724147147BF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", matchCriteriaId: "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", matchCriteriaId: "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", matchCriteriaId: "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*", matchCriteriaId: "9F611716-F3D6-4187-AE71-4FF87C95C18E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*", matchCriteriaId: "D5F67974-81B3-43C2-8DAE-A66C6A876B7A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*", matchCriteriaId: "1054FBFC-1609-4301-A0D0-B78878FB2427", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*", matchCriteriaId: "A0F889F1-3B57-46C1-9C23-9E78CD0DEECF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*", matchCriteriaId: "93929C7B-D4D9-436B-BA69-FD3C22FCEC2D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*", matchCriteriaId: "C7F9109E-EADD-40F4-8360-BF7E37433E2B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*", matchCriteriaId: "41F7C959-BC66-40AB-8038-D37181A4CE5A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*", matchCriteriaId: "3B9B3858-E58D-471E-8F12-DC109A133B81", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*", matchCriteriaId: "4D37104E-78E5-4368-B67F-1F8C63873C3C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*", matchCriteriaId: "A3B6BBA6-BAA6-4258-8A5D-94CD786A3B96", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6402p:-:*:*:*:*:*:*:*", matchCriteriaId: "38F01770-A6AD-4F7B-8FD6-C066241A139B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*", matchCriteriaId: "30DFA368-60E2-42D7-9C59-04F61F1A1FDB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*", matchCriteriaId: "0974E563-6326-4E79-95FF-40625440696E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9D15BA-CC1B-4D83-9944-2593E2BA4AB2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*", matchCriteriaId: "467F294F-2FC5-4B2A-A1CD-4FE90F9D9C16", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*", matchCriteriaId: "E904FB93-EFF6-4E8E-92F2-95C4952B0240", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*", matchCriteriaId: "5B232290-B3AD-4BB5-80B8-4CB3E6259A44", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6585r:-:*:*:*:*:*:*:*", matchCriteriaId: "C2607AB1-D851-4D83-9198-5B9A148E9B5F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*", matchCriteriaId: "772568B9-C502-4154-9320-16D78BF60B34", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*", matchCriteriaId: "912614A7-45BA-411D-AE77-610EFE8D2A35", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*", matchCriteriaId: "8FBD651A-306D-4341-8DEE-2E928CA6E0EF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-6685r:-:*:*:*:*:*:*:*", matchCriteriaId: "61D61E39-79F5-4606-B196-D79A9C2C738C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", matchCriteriaId: "E993BEE9-72BD-4615-B1BE-5E9129D61ABD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", matchCriteriaId: "EFA6BB38-CDF8-46B0-9910-897AB7920D18", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF244D02-2B47-4884-8D70-37DFEB18CB60", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", matchCriteriaId: "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", matchCriteriaId: "2425FF8A-158C-40EE-BDBF-43E7641BC058", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", matchCriteriaId: "ADA681B4-37F8-4E2E-B73B-E0E17C66B754", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", matchCriteriaId: "173C6F98-4022-4F40-A39A-D3D490CA6461", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", matchCriteriaId: "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", matchCriteriaId: "78F1BD53-55ED-4346-A67A-141B5BC552CD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", matchCriteriaId: "44D7B5DF-716F-48E6-9445-BB56A620DEF1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", matchCriteriaId: "2F3E6176-6F6D-4488-A03B-2BBF846ADC93", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", matchCriteriaId: "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", matchCriteriaId: "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", matchCriteriaId: "BF705120-459D-49BA-BDCD-6AC38D95C820", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", matchCriteriaId: "2B91585C-4BD7-475B-8AC8-1B813A698D77", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*", matchCriteriaId: "70B7093E-97DA-4BED-AE7C-87090B82E5E8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", matchCriteriaId: "CFA675E6-83DD-47FF-BEBC-D32E5223A065", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*", matchCriteriaId: "F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", matchCriteriaId: "2DDA599F-09D5-4351-B7F5-351A2E04E091", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", matchCriteriaId: "F4D55B9D-4BAB-4082-A33F-626E15229333", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", matchCriteriaId: "4E920376-561D-4892-97A2-F4400223B3CA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", matchCriteriaId: "9D350A92-3992-4464-84AB-960ABCA45698", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", matchCriteriaId: "CF02D685-1E67-40E1-A858-000498D5D877", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*", matchCriteriaId: "F8CE3D72-A3E6-4E8C-8673-D9265D66A449", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", matchCriteriaId: "8AC9F52F-6669-459A-A0A9-8F472E1F2761", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", matchCriteriaId: "A7E91B92-4DB7-4866-8370-C6F8616D3D81", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", matchCriteriaId: "85F465BF-4548-45EB-AC40-384F4E6248EE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*", matchCriteriaId: "E7950151-6BF6-4A80-9370-ED92B59635BC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*", matchCriteriaId: "35F7D93A-7C16-4189-ACF2-9B3760180FCE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*", matchCriteriaId: "9A72E6F1-5A3C-4D8E-8F5F-0D92BC1CD8CA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*", matchCriteriaId: "24A5BA20-2193-4C17-BBDC-8615D9333D96", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*", matchCriteriaId: "3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*", matchCriteriaId: "55240EF3-B56C-45DF-B868-6DF59A349E23", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*", matchCriteriaId: "26975700-3A56-4D17-ADDC-77CCE82A6C98", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", matchCriteriaId: "B1DFFFEB-CC63-4F51-8828-C5D4E0287264", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", matchCriteriaId: "B176D141-26B0-477E-B2DB-2E48D6FB82AE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*", matchCriteriaId: "43B9F540-DFCD-40B2-8DE2-9AE9D123A48F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", matchCriteriaId: "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", matchCriteriaId: "FD97F84B-ED73-4FFD-8634-10631FEE03EA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", matchCriteriaId: "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", matchCriteriaId: "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", matchCriteriaId: "2243674B-E505-4FED-B063-953A1569EA30", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", matchCriteriaId: "BA08C262-414E-401A-8F91-131626FA82A5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", matchCriteriaId: "E1978F85-5BA5-468E-B797-7FA7EB4F489D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", matchCriteriaId: "B8D3D0CA-C981-4091-99F9-203DA8F156F2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", matchCriteriaId: "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", matchCriteriaId: "6CC9312B-40A7-4D4A-A61C-3BA865C29F63", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", matchCriteriaId: "7EBECBE5-2BF0-4175-81CC-C6D054C819B2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", matchCriteriaId: "BB33CC4F-9D51-4A11-B063-6E78F0D71555", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", matchCriteriaId: "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", matchCriteriaId: "DA491401-C484-4F77-ABF8-D389C94BF7B7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", matchCriteriaId: "66F8B600-B618-48E1-81EE-14A8A843F09F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", matchCriteriaId: "42ADD367-82C8-4761-AEBA-A0200C5D1CEE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", matchCriteriaId: "4AF75C0E-BA48-4C56-8398-109D06B5A5D3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", matchCriteriaId: "25329A6F-9D49-4EA7-B9FB-8C2FA5343475", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", matchCriteriaId: "22921B65-513F-4ACE-80A2-4A31199BB5EF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", matchCriteriaId: "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", matchCriteriaId: "D5365D3B-1B0B-416D-ACFB-23843FD25EAF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", matchCriteriaId: "2556EF0A-B29F-4E9E-BB77-955CBC851EFA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*", matchCriteriaId: "3AD253CF-55F8-4350-AD79-6CB5526DEB57", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", matchCriteriaId: "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", matchCriteriaId: "5601E40A-96E1-4321-9682-055A1C607488", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", matchCriteriaId: "CF36D9CC-2FD8-4D08-8712-E625D4754613", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", matchCriteriaId: "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", matchCriteriaId: "E11C7F38-3313-4F6D-9D5D-E61C89E716B1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", matchCriteriaId: "70B0C976-3B68-4647-909A-5D574D711C7D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", matchCriteriaId: "EA18192E-7DBB-45BB-8568-CA7159AF8CE2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", matchCriteriaId: "B2FDB568-5340-4DD8-B933-1CD64C370BD6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", matchCriteriaId: "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", matchCriteriaId: "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*", matchCriteriaId: "104B88E7-3B8F-4C4E-AD07-CAD1DCD7898B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", matchCriteriaId: "12ADA9A2-6E64-4F17-B369-816639F0D3BF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", matchCriteriaId: "514B7B5E-D60D-464A-8CB0-273044FD2E09", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", matchCriteriaId: "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", matchCriteriaId: "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*", matchCriteriaId: "4266C712-B84F-45AD-B108-C890E073FA82", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*", matchCriteriaId: "AD9E14F8-2003-4D8F-A9E2-9633B478DBA1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*", matchCriteriaId: "BD5E62D8-BA9C-48F6-B3B6-18DCA83D8C43", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*", matchCriteriaId: "FC77BD1C-BB51-4FE4-83A1-B69E6371B15A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DF4072-DD12-41CC-8E18-E178BA3C8A26", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*", matchCriteriaId: "AF0F0769-A572-4C23-BDB4-647CAEA8BF41", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*", matchCriteriaId: "E754A91A-7DBC-427B-A01F-9501D1A4668C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*", matchCriteriaId: "83610FBC-6D1E-465F-AFE3-625E951AE4E8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*", matchCriteriaId: "4205855A-2A51-42EB-A5EF-4AD6DF409A6F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*", matchCriteriaId: "035563B3-4F45-4B12-9F2C-C8ED678232FA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*", matchCriteriaId: "0F296558-643A-40A8-AD03-A88F70AC121D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*", matchCriteriaId: "F821873C-2F30-4D98-8570-5DDBDF5D3C94", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*", matchCriteriaId: "260E6E09-671F-428A-A653-0E594FC2F5BE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*", matchCriteriaId: "0133C635-7981-470D-ADB3-92A9C884F273", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", matchCriteriaId: "6CAD248D-0B95-4BE1-917F-E0976447927D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", matchCriteriaId: "5726D5D4-F188-4F06-B78A-2C7C694A40E3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", matchCriteriaId: "72467515-7793-479B-BABF-839275CA9AAD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", matchCriteriaId: "56B79264-C756-408C-A32A-BFD4AA0B20CA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", matchCriteriaId: "4D3DB891-40F6-4000-BEAE-A1710C70C43D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", matchCriteriaId: "0D3EA33F-D137-4B24-9211-C8A62A7427A6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", matchCriteriaId: "86FFF97C-C121-4F91-B62F-057356B0A048", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", matchCriteriaId: "213B09CA-91E9-4D11-AA11-B84F40495E9A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*", matchCriteriaId: "EAFC55E4-D84D-4588-976D-1E2637B1BF0E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", matchCriteriaId: "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", matchCriteriaId: "FAC1A189-D822-405B-A090-B1573FE12B14", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", matchCriteriaId: "31C57E58-66E3-4FEC-A88F-B82C4B372B2B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*", matchCriteriaId: "1A0BDFFB-638F-4FB7-A43A-812874D8774A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*", matchCriteriaId: "05C468AE-3FA8-48B5-A05C-0690F1019190", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*", matchCriteriaId: "C173CF7E-81DF-4AD5-AB17-A4C330B933D1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", matchCriteriaId: "638549EC-1BB1-4206-B8DC-C0101BBEF8A3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", matchCriteriaId: "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*", matchCriteriaId: "112701D9-7154-46E5-BF36-EE36A607C7DA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*", matchCriteriaId: "14CB46AD-0395-4675-9714-CCB2A180EBA1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", matchCriteriaId: "87B5258B-26E4-4853-9F27-4BB12886CC38", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*", matchCriteriaId: "5854EF2F-7B58-49FA-B09A-2066799E2F2D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", matchCriteriaId: "9B1B04E8-A31F-4027-8E05-5461E7855F04", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*", matchCriteriaId: "E474DFB1-4173-40B8-B02D-42AFC5C86F9A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", matchCriteriaId: "49BDD476-E402-408D-9BD6-886AB195704D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", matchCriteriaId: "0D566CFB-935B-40E4-9F4E-6216A42E7EBA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", matchCriteriaId: "6A97ED15-D0C6-4B64-BA08-EE50A6990272", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", matchCriteriaId: "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", matchCriteriaId: "6D57834B-C031-4301-9839-7A32F13687EF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", matchCriteriaId: "CEE126ED-B743-4C6D-95FF-04F473A9A008", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", matchCriteriaId: "4D901944-8E2B-41E5-BB82-CF1C97064711", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", matchCriteriaId: "2A13E353-0063-468B-96CD-97BF91C747C9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", matchCriteriaId: "913BBEFF-49E7-42AF-A850-B49E5A12AB98", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", matchCriteriaId: "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*", matchCriteriaId: "8580A81E-8BDE-4EB5-B830-6AA7550A25C4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", matchCriteriaId: "B8C1205B-6AC7-4DB5-B247-2108511D9957", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", matchCriteriaId: "FA47107D-237A-4184-8BA2-601660F7FB5C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", matchCriteriaId: "E9862E49-124E-4B7D-941A-CFD2668B6481", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*", matchCriteriaId: "43756EB8-9F85-4499-99F0-43E69CA3F470", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", matchCriteriaId: "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", matchCriteriaId: "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", matchCriteriaId: "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", matchCriteriaId: "957F3AC9-D071-4932-B2C9-1643FB78BC7A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", matchCriteriaId: "1395788D-E23B-433A-B111-745C55018C68", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", matchCriteriaId: "05EA3461-021B-42CD-B4BD-4D2E8703DB93", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", matchCriteriaId: "CB6774C8-431B-42AC-8955-02B529222372", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", matchCriteriaId: "F41025AC-6EFE-4562-B1D1-BAB004875B06", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", matchCriteriaId: "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", matchCriteriaId: "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", matchCriteriaId: "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", matchCriteriaId: "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", matchCriteriaId: "04076FFA-D74F-4501-9921-D8EBDF97CD20", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", matchCriteriaId: "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", matchCriteriaId: "B8846D3C-39C6-48BE-9643-ACC479416257", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", matchCriteriaId: "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", matchCriteriaId: "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", matchCriteriaId: "F423BBE6-327A-40DC-8BCE-BF43600A68D5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8706g_:-:*:*:*:*:*:*:*", matchCriteriaId: "74DB5608-BEAB-4080-BD40-76C2FFB4DDCC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", matchCriteriaId: "08718840-D468-4E86-8FFF-A2B1841E6BF6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", matchCriteriaId: "C9B77426-B579-43C6-9340-F291138ECD7A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", matchCriteriaId: "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", matchCriteriaId: "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*", matchCriteriaId: "A6D63DC7-0623-4777-86EC-06697FEBFD10", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*", matchCriteriaId: "CD7CD68D-6177-4F61-ABAF-C88453BD6C52", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*", matchCriteriaId: "C289687E-4D0F-4F32-92A8-137B5D6AA3C9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", matchCriteriaId: "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", matchCriteriaId: "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*", matchCriteriaId: "AC758216-672D-4F7B-8CF3-6433B06AA2FE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*", matchCriteriaId: "419680D5-21E0-491C-98AA-9D079213A020", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*", matchCriteriaId: "867027D4-9EB4-4BAB-BDCC-FD43A087442F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*", matchCriteriaId: "31CD303F-AAE9-4635-987D-742031232BDD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*", matchCriteriaId: "57014B8E-5689-416B-9FE6-CE4A259E83C9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", matchCriteriaId: "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*", matchCriteriaId: "5E3625E5-4583-4F38-B6E3-68FD20E54ACB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*", matchCriteriaId: "6C365D42-1DEA-4FF2-86E4-1CC27E52E40E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", matchCriteriaId: "39F9F143-0AB4-4302-82B8-B4EA790EB08D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", matchCriteriaId: "FE73B0A0-E275-449D-8ADD-86AE188DE82A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", matchCriteriaId: "CE06C64A-1610-4340-98CF-AC91258AB215", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", matchCriteriaId: "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", matchCriteriaId: "B07609EB-E10B-4253-938E-81566036D81B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", matchCriteriaId: "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC44D69-AAAB-4524-9D12-F1A606D57831", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", matchCriteriaId: "D23D2887-1246-4EA4-B8B6-57BC7FB869E6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", matchCriteriaId: "BEFC46D5-B23D-4513-9669-4DC53662F87B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", matchCriteriaId: "B93E897C-5D7B-4532-99D9-53192A1F776A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", matchCriteriaId: "33D0D618-D738-47F5-B7F7-C7F07972C893", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", matchCriteriaId: "C7A147E8-0778-49CE-92EF-ED1950138528", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", matchCriteriaId: "3D264277-00CB-4FCC-ADAA-38536609D0F8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*", matchCriteriaId: "7DFC6D19-9E02-4DE5-818F-931779A41F74", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC25725-73F6-4948-B17A-A05E8978EB78", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", matchCriteriaId: "6D9BFA32-89B3-4E26-B980-2694B5378D8B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", matchCriteriaId: "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", matchCriteriaId: "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", matchCriteriaId: "7FECF6BE-2CED-4510-91C5-195686C9C421", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", matchCriteriaId: "B903E2A0-EE73-4F13-AB26-8F5644462E94", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", matchCriteriaId: "170B497C-05F2-46B5-92CD-ACF7C0BE1711", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", matchCriteriaId: "EEF53EA8-8EB4-455C-A986-405DBB122D3B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*", matchCriteriaId: "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*", matchCriteriaId: "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*", matchCriteriaId: "BAC07903-D4B7-423F-9F79-7DF45E5350BB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*", matchCriteriaId: "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*", matchCriteriaId: "EA65F0A9-8BBE-4674-86B8-894484DC6C88", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*", matchCriteriaId: "D93CC48C-DCCB-442A-98D5-3165CCFAE7F4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", matchCriteriaId: "659206BB-510A-47F8-8B6E-FD030A6BE1DA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", matchCriteriaId: "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", matchCriteriaId: "7C3257F5-CA55-4F35-9D09-5B85253DE786", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", matchCriteriaId: "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*", matchCriteriaId: "5598510F-1057-4DB6-838C-8945FB6978DB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", matchCriteriaId: "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*", matchCriteriaId: "655E770E-B9EE-4B08-B1EE-F393C7F68941", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*", matchCriteriaId: "DBC47200-8F3F-4969-AABA-39F4B1E4E263", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*", matchCriteriaId: "7EB17629-2454-478B-8E1A-AC2D2FC2233C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*", matchCriteriaId: "A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", matchCriteriaId: "A48A2969-DC53-48E2-A5CA-4DF2B00D1960", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*", matchCriteriaId: "2534F0E2-C427-4514-AE51-26EB0872B519", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", matchCriteriaId: "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", matchCriteriaId: "F76BE235-C991-43BB-B145-239D95084BC8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", matchCriteriaId: "6748F85C-A99A-4380-B01A-A51DBD43AED9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", matchCriteriaId: "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", matchCriteriaId: "C04332C1-9652-44ED-BD97-5A6AD0A4E6B5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", matchCriteriaId: "0D376C32-99BE-4DF4-A63D-2156D10EEA73", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", matchCriteriaId: "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", matchCriteriaId: "FA0D6C21-7DCE-4F8C-9394-D0006695550D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", matchCriteriaId: "BD6B51B5-96AA-44C8-9539-9D7F67143DC3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", matchCriteriaId: "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", matchCriteriaId: "4EB78854-1E03-48F3-BC86-B0934641B47E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", matchCriteriaId: "64D3350F-8083-4FD3-9432-36C10EE911EB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", matchCriteriaId: "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", matchCriteriaId: "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", matchCriteriaId: "3D6425C6-A338-42A0-B236-12B33147931D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", matchCriteriaId: "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", matchCriteriaId: "4861FF06-6720-4E5A-B599-F7F96D7D4FE6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", matchCriteriaId: "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", matchCriteriaId: "A263FA56-5F1F-4E91-A354-38648E130685", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*", matchCriteriaId: "102AFB09-B4EC-456C-899A-A9ABDA120D54", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", matchCriteriaId: "D24E8214-881A-4C15-A544-FB3FD5D14DCA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*", matchCriteriaId: "02454A49-0345-4927-89DF-7A37C25E4E11", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", matchCriteriaId: "9E07450B-D81B-474D-9150-C9D8A62D44A0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", matchCriteriaId: "9A892B60-7FD3-41A6-9997-586B76757416", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", matchCriteriaId: "4701D592-F06C-4713-9736-19DB130B5E2B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", matchCriteriaId: "B3E6063A-23C9-4845-B575-5D330B6C68F6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", matchCriteriaId: "D50C73A4-D52E-4560-B725-61F416E18505", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", matchCriteriaId: "25570E2C-BBE9-402F-9631-FA5014767CE1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", matchCriteriaId: "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*", matchCriteriaId: "998DCE68-F426-47C5-80F7-BFE42FD69DFB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g7400e:-:*:*:*:*:*:*:*", matchCriteriaId: "917B3772-3856-4C63-9DC8-FE887A93CB95", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*", matchCriteriaId: "FBE04ADB-3037-41E8-8DF4-8588FDFB759A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:pentium_gold_g7400te:-:*:*:*:*:*:*:*", matchCriteriaId: "0CBF8567-4F5B-4142-9A3B-BD6AEE33595F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", matchCriteriaId: "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", matchCriteriaId: "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", matchCriteriaId: "E687CADE-6E49-4284-BD41-6CA2FDD846FC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", matchCriteriaId: "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", matchCriteriaId: "404409CA-326B-425D-A4E5-1A3C8CC45344", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", matchCriteriaId: "AA5E65D0-6DB9-41D2-9721-8F1232D8155F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", matchCriteriaId: "46066C5B-DB48-4B83-9E5E-3809D3F7FED2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", matchCriteriaId: "E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", matchCriteriaId: "D99D4F6F-5874-4F5D-91FD-E265DCE86667", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", matchCriteriaId: "47DB082B-E169-4BE0-81DC-B2A7219C4DA3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", matchCriteriaId: "4FA0A03C-21BB-4C5D-85B3-FF579F34E82C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", matchCriteriaId: "BD387ADD-02CA-4154-BF86-0DBE664FE5F5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", matchCriteriaId: "CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", matchCriteriaId: "74F2A5C9-C593-4C42-A47E-F563C4696137", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", matchCriteriaId: "EA7576BD-43FE-44D2-A665-F78BDA4D964D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", matchCriteriaId: "EDA12CAD-F622-4F14-8847-AFD8DC250B40", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", matchCriteriaId: "BA062554-DBBC-4215-9705-1ADA545B5887", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", matchCriteriaId: "BCCDD79D-80C4-4A52-94F6-F30237AE0C53", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", matchCriteriaId: "AC6E2595-D9E7-46D6-99C8-336DEB1B4020", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", matchCriteriaId: "829702E9-C0EB-4E4B-A979-41A2235B182B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*", matchCriteriaId: "5A84814F-B070-45B0-ABC2-1BAAA212EFD2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", matchCriteriaId: "C9BD8917-5BEA-491C-B6E8-486FF957A876", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", matchCriteriaId: "B897D23E-1BC1-4FBB-AD00-422413C1749C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", matchCriteriaId: "E5C50FBC-6933-4E98-82B9-A70B1C836ED8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", matchCriteriaId: "8F8AD4D2-D48B-4F53-A0BA-A90E5A970832", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", matchCriteriaId: "971C6442-6546-440B-AD74-44A5BB527D11", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*", matchCriteriaId: "1F4B6C48-261B-4B0E-BA2A-7E3060D01F93", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*", matchCriteriaId: "41FC8B26-7611-45B6-A37D-DF7025E2E92D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*", matchCriteriaId: "543DB437-425F-4FF7-BDBD-FB5CC17E0056", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*", matchCriteriaId: "97E8DD28-EC33-489F-A71C-2AEACFB16FC9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*", matchCriteriaId: "84B97F2B-A3D1-48A3-9FB7-755191FDD720", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*", matchCriteriaId: "10FD9FEF-2186-4416-93B7-B743657412A1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*", matchCriteriaId: "38161238-5D40-485F-B0D2-D7621EC317D6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*", matchCriteriaId: "0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", matchCriteriaId: "B804174C-53DB-4641-BD26-3ECDD9FBD638", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", matchCriteriaId: "B3930A6D-64DC-4953-AD7E-EED0C48B048E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", matchCriteriaId: "2B10FCF1-F496-4166-9162-41012C4D2B16", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", matchCriteriaId: "ACAAD0F0-9182-46EF-8399-C04FB472BE6F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", matchCriteriaId: "FCADFB25-DCBB-4901-9E4D-132ED49C7F26", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", matchCriteriaId: "F0327393-DB2A-455B-8E20-3EDB3766CDA6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", matchCriteriaId: "C2E00698-8A08-433F-8852-8EDC422A53D8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", matchCriteriaId: "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", matchCriteriaId: "4925D0EA-D524-432F-8417-892BB8C3DDFA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", matchCriteriaId: "F3757F7B-4283-4ABF-974B-59E4E2358035", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", matchCriteriaId: "93D86199-5CF3-4E7A-8295-50F958EA4B4C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", matchCriteriaId: "122BD094-E815-4081-B674-B71AC193BE0F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", matchCriteriaId: "43126A13-5931-4989-BEFD-E1A096F98D94", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", matchCriteriaId: "342E0783-288A-4DB0-A657-29937903927C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", matchCriteriaId: "D4C40F91-138F-4396-9A6B-B969F6AC30B8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", matchCriteriaId: "23CA9365-B1C4-4188-A9BF-19215AFF58A0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", matchCriteriaId: "C4797D2E-1270-447B-BFE4-CC96D9F10D5B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA77EB3-6F11-43BC-8B59-84217AA73205", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", matchCriteriaId: "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", matchCriteriaId: "331B8F10-3A20-46A8-B960-3546271CF701", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", matchCriteriaId: "AE638E59-DF75-43B1-A6DC-10A838B05B00", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", matchCriteriaId: "109FA97C-10EE-41F9-B52B-B37E31642251", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", matchCriteriaId: "A67B3834-E59E-47AF-A806-13A990E812B3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", matchCriteriaId: "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", matchCriteriaId: "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", matchCriteriaId: "DD176FB0-7427-4F2E-A969-72062BB3EF98", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", matchCriteriaId: "B278081F-F900-4581-9D10-B5A2ACD2E2C1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", matchCriteriaId: "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", matchCriteriaId: "45689B37-5085-41B3-BA9D-F05FD07DF1FC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", matchCriteriaId: "A7186EA5-448F-473A-8FC8-058FC823ACC5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", matchCriteriaId: "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", matchCriteriaId: "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", matchCriteriaId: "F58AEEB9-919B-4C6C-83B6-080846786A56", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", matchCriteriaId: "C0BAE174-A158-4807-9D67-36F795028D76", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", matchCriteriaId: "FAD38AEA-979D-484B-82F0-0161BA39E9F5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", matchCriteriaId: "780AB9F4-0C87-4528-B53A-69FBC4D87ADB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", matchCriteriaId: "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", matchCriteriaId: "C2CA54AE-915F-45B9-B775-C04589E49802", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", matchCriteriaId: "DB86F018-1F56-4146-A78E-C7BF7B616023", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", matchCriteriaId: "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", matchCriteriaId: "00912C9C-D386-445E-B390-E96361ECDFA6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", matchCriteriaId: "60B582A1-784C-4BE8-A0D5-706DE01D769E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", matchCriteriaId: "320597E9-6A2B-47E6-A33C-6B31A81902EA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", matchCriteriaId: "556637E1-9502-41E7-B91D-082C92F233A1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", matchCriteriaId: "5EA930BC-EF68-4AD5-AA1B-0659358028D5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*", matchCriteriaId: "1A8EA870-2228-4E81-A417-30E040A5C0E1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*", matchCriteriaId: "656D31B6-1E8D-4A44-9D7A-023051E7050A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*", matchCriteriaId: "49EEE5AA-3867-4137-B165-5004C34C77B0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*", matchCriteriaId: "B2A38417-1DB2-4C85-80D9-D3968BF7A83B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*", matchCriteriaId: "1F74E9E4-F84C-4B7F-8A42-20EEC60986DB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*", matchCriteriaId: "74F99F83-A7E6-4AFD-BC42-7348EF6613AA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*", matchCriteriaId: "5A62A9F4-2B98-4F2D-9143-08D1689E38AC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FD06CB-F456-44BD-900B-06131DC68B6B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*", matchCriteriaId: "9044310E-4DF9-47BA-9D05-C1405DC8CDB2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*", matchCriteriaId: "BA881CDA-1C16-43F1-A7D5-69502512A21C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "4E629CF7-A706-4DD3-B3EB-A1F9711B0372", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BCDBDF-A902-43A8-94A8-13541FB8CB32", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "1CC1EDA9-6CB8-4643-AC65-76B892319879", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "15DB4F8D-E42C-4119-83BD-44D6AB9319B0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "51E0227B-8F2B-48B3-97BC-73BA1BACEED8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "C8BD1F0B-7B75-4A5A-A708-BDE56D237354", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "DE01A935-4048-4578-8FBA-1D12A95654D1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "28D7D164-E631-4D49-B87A-0B7885148790", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A10975-3375-4FB3-A008-56EB2ACD2737", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "E6A99895-6A48-4A44-B0F7-7BED55C677FC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", matchCriteriaId: "37AF4F98-0672-4101-9825-57B0F64EDBEE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", matchCriteriaId: "2231374F-222A-4BA3-B14D-F69860668F7A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "057E3667-7BA8-4142-8A1E-B957333D776A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "84A77114-92C8-48C4-9D12-3ACC3030D5A3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "13B5BF22-5E95-46A4-AF05-450CFD1312C1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "9490F926-AD57-40F3-A523-61D67486DCB0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "29CC9B92-CF59-4121-9638-F4D4521952D3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC6592D-743B-4656-B1C0-247F36ABE5CA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "BCC32129-C5DC-4D26-96D5-219F5291D6F2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "81F4426C-970C-49DB-950B-3F5ED17E682A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "4ADED698-2702-479C-A24E-E9E6F35E9AFE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "D86C0CFB-72A3-4446-9601-2C956C9A71F4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", matchCriteriaId: "DE862F15-69CC-488E-ABE8-1E23A5A1089F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", matchCriteriaId: "9087D09E-ADCB-478A-87FD-B7113FD29EFB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*", matchCriteriaId: "0B43E11E-5350-4DDB-A743-F84D4D2286D4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", matchCriteriaId: "5D64D1ED-A386-4475-99AB-7727DE67E1A2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", matchCriteriaId: "6EFB4646-A5BA-4662-A47F-62407AFEDFF2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", matchCriteriaId: "29A923F6-E352-4752-B7D3-007FE1CAFE06", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", matchCriteriaId: "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", matchCriteriaId: "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", matchCriteriaId: "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", matchCriteriaId: "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", matchCriteriaId: "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", matchCriteriaId: "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", matchCriteriaId: "E06531E6-126A-4FBB-BEBB-F9023C4738F1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", matchCriteriaId: "93B8CDF0-1489-4E4C-B004-A22E06FC10D7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", matchCriteriaId: "A6ACF161-472E-4088-85C2-5940C9C88D45", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", matchCriteriaId: "067C65E5-5392-4DAF-A6BD-640D78C19CE1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", matchCriteriaId: "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", matchCriteriaId: "D93CC498-F558-4C2F-9E14-7897060CA9FE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", matchCriteriaId: "6839AE9B-9A8A-4312-80FC-0549C675A815", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", matchCriteriaId: "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", matchCriteriaId: "43808CCF-1EF0-41CE-983D-DD6BB775895E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*", matchCriteriaId: "F2C5D3DE-5506-4F16-B7F9-5032A1277D23", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED598260-2A9B-46F7-AA85-0DA97DA0D42D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", matchCriteriaId: "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*", matchCriteriaId: "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", matchCriteriaId: "3BF1F73B-4736-40BC-9053-951B5BF1059E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", matchCriteriaId: "EDA47606-176C-4F6B-A316-4C536B63FA4E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", matchCriteriaId: "D609DB7E-AE80-48E0-B7B6-E622B6208ABF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", matchCriteriaId: "A09C3656-AE49-4F26-BD28-B725E8C40304", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", matchCriteriaId: "90F0D1EF-2FE1-498A-AE38-BF755A680E88", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", matchCriteriaId: "22243DEF-F01B-4774-AEC1-40D776E1167E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", matchCriteriaId: "25934425-944F-4B9A-8A16-F1DCBF3D5032", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", matchCriteriaId: "6A5BC76B-A4FC-4702-A544-889E62F8509E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", matchCriteriaId: "7F4E44C3-D29F-4057-AE12-BA19FFFF69E1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", matchCriteriaId: "383DCE68-3882-4274-AA4A-5E030530E4BA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", matchCriteriaId: "04EC7421-963C-43F7-9450-2E204BAFF1F1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", matchCriteriaId: "5E3AF74E-C719-4E55-959D-681174FFFB90", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", matchCriteriaId: "E290F38C-7A86-469D-9E6A-F0EC69DBE23A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", matchCriteriaId: "6EF77397-85D0-4EC2-9887-2D0D9D253450", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*", matchCriteriaId: "9E9761E8-7978-4141-94B5-EEFE7C00BC9A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", matchCriteriaId: "A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", matchCriteriaId: "E921DEBA-3063-4639-9823-2FDDD8DEA793", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*", matchCriteriaId: "CF44A7C9-834B-49DF-B1B6-B1575473179B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", matchCriteriaId: "5983B72F-9194-47CB-B444-2ECC6360B686", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", matchCriteriaId: "09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", matchCriteriaId: "5E0E40BC-5745-4AB0-B991-61A0C63DB284", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", matchCriteriaId: "6E207648-E57F-4C43-8FDD-049BF9214664", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", matchCriteriaId: "39EB131A-87DE-45FB-9025-B02EC28C4304", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", matchCriteriaId: "5AF30717-CBEF-42F9-AE0D-4F6A1877EA55", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", matchCriteriaId: "D99D0351-303B-4ABF-A7FD-734176095307", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", matchCriteriaId: "5B080431-626C-4A7B-AB37-47EE6811A5A0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", matchCriteriaId: "76D48CFC-1322-4C53-8B53-88E7ACC724BE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", matchCriteriaId: "5F6456D0-32AE-44A9-9F63-AD64B5E49182", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", matchCriteriaId: "38EA99F9-22C2-47ED-9DDD-928E19C4C51E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", matchCriteriaId: "9F8867B2-F297-4D30-AD43-77B0F67FAE3E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", matchCriteriaId: "178345A5-9A38-4C8F-B3BB-430276FA4998", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", matchCriteriaId: "831A7D63-4638-480C-94CB-ED06613BA75C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", matchCriteriaId: "178D9E36-79EC-4672-8E46-0FD6597CA1CC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", matchCriteriaId: "EED0D492-ADAB-41ED-A283-024D3CED441F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", matchCriteriaId: "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", matchCriteriaId: "D9733E69-E7CF-444C-B72C-AC8E5DEF2449", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", matchCriteriaId: "0FD24563-9157-4DE1-95ED-D4E3E879219E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", matchCriteriaId: "F83F8602-6679-4B3C-BBDD-3BDB2B317F70", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", matchCriteriaId: "3CD3E45C-1943-42BA-9F6D-EA64D67BF954", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", matchCriteriaId: "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*", matchCriteriaId: "9B27F755-4C38-4469-8A9D-C9266BDA53ED", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", matchCriteriaId: "0E21977E-7085-46C5-8E89-F952C2EBCE04", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", matchCriteriaId: "DB72D13B-5880-4CB2-8E80-CB6A39B5A302", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", matchCriteriaId: "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", matchCriteriaId: "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", matchCriteriaId: "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8292CC-DACB-489A-BCB2-73DC2C6F944C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", matchCriteriaId: "2D83AEDF-2671-4278-8088-BA517192AB3E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", matchCriteriaId: "BF72F37A-2F28-40E6-A84B-0E1DF63B1812", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", matchCriteriaId: "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", matchCriteriaId: "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", matchCriteriaId: "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", matchCriteriaId: "5241B3E0-F968-4B16-8BF8-191C6F7B224A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", matchCriteriaId: "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", matchCriteriaId: "B82FC910-F3AB-42BF-9740-EC09F0AC179D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", matchCriteriaId: "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", matchCriteriaId: "3BA58EFB-7672-4902-ABC1-65217AA617AD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", matchCriteriaId: "96E2764D-7D6A-4CE0-A628-FFE966A6462F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", matchCriteriaId: "1D66D18C-17F2-4259-B1D8-7C63797A024C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", matchCriteriaId: "25C8DFB5-9D8B-4370-849A-DC061910E54F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", matchCriteriaId: "0B704835-1250-44E1-923C-5DE2F4DD25D0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*", matchCriteriaId: "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*", matchCriteriaId: "FE3CA224-B5DE-4451-9CF9-929ABEA242EF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", matchCriteriaId: "A3D8E340-AE91-4F29-9F22-E0CE6718FC13", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", matchCriteriaId: "710DBCD5-788D-4140-AC16-EC6E126CFA66", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", matchCriteriaId: "A767EC83-AAED-4FEA-A35E-A503369FE4FB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", matchCriteriaId: "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*", matchCriteriaId: "20821868-F7D2-4132-8D63-98E1089DB46C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*", matchCriteriaId: "4EB9295A-8832-4670-B268-FBD0BC086447", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", matchCriteriaId: "489BD4AC-50C6-422B-A2B2-00A70E611114", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*", matchCriteriaId: "C5694238-F4E5-4689-ADD2-67C25762ED92", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*", matchCriteriaId: "A57D44C0-AA8D-46B0-8923-ADB312E3937F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A551BBB-76CD-4C26-913F-B02C66E5D846", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*", matchCriteriaId: "8A4A44F2-68BF-4709-946B-C976DA3A9C7E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*", matchCriteriaId: "038AC553-5523-4687-843D-6FEA7264EDEA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*", matchCriteriaId: "8DE5D09C-3272-4810-9F41-97BDBBFE4160", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", matchCriteriaId: "59C5122F-D822-4E71-A417-88EB51F1786B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*", matchCriteriaId: "F14C3438-B876-45B9-85F5-61354207AF8A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", matchCriteriaId: "9236F094-B913-43F2-B703-CE33B9CEBA0F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", matchCriteriaId: "E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", matchCriteriaId: "345FF353-FE25-41F4-97EC-FF32BE2796EA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", matchCriteriaId: "68A9AD79-9B4B-4EE8-810B-359901C3540C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", matchCriteriaId: "BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", matchCriteriaId: "19BF77DA-E159-4336-A552-B22BE437670D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", matchCriteriaId: "E86CCC45-270E-4760-A7E9-D39C74C00FCF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", matchCriteriaId: "C105930C-D2BB-4FA1-B5D1-882D90D867C3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", matchCriteriaId: "45227E88-ACFF-43A5-AF45-C6542A6EF681", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", matchCriteriaId: "5FA2030D-CEAF-46BF-9669-19EAD541BDB6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", matchCriteriaId: "1612AE8A-3165-47A3-AEA8-65F4156C48BA", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", matchCriteriaId: "C5168E40-DF2F-4E39-8B5E-9659EBBB99A3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", matchCriteriaId: "94A6DA7A-7C97-40E1-B31A-B92BB658C429", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", matchCriteriaId: "54AF128B-9984-4C91-B7F6-968DE376C3BE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "28B167F1-63FA-4C86-84AB-836ABF84E6E3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", matchCriteriaId: "955420F9-3A3F-40E0-9940-DD43C5C78D62", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", matchCriteriaId: "BC4A437C-6C00-4729-91CC-D27EB3542633", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", matchCriteriaId: "74ED727D-B1A9-4F4B-92C7-3F00F3A80013", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", matchCriteriaId: "A2C24951-B3FA-48E6-AFAC-6CA0D2348230", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", matchCriteriaId: "185E8FBC-9EE9-472E-867B-0B0DEEECA13E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", matchCriteriaId: "AB3C00A0-C28A-46EB-853D-DAE3819399D9", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", matchCriteriaId: "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*", matchCriteriaId: "D7C504C3-7EEE-4A0F-8589-19C1E806E690", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*", matchCriteriaId: "5230F6AF-88CB-4EE2-B292-8B9A7217D10F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*", matchCriteriaId: "5B45C39D-03E8-46C1-88DD-94E382F4A961", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*", matchCriteriaId: "EF2DC691-025A-441E-AAC2-C8583F54733D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", matchCriteriaId: "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", matchCriteriaId: "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*", matchCriteriaId: "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*", matchCriteriaId: "EB15368B-21A1-429E-8B9C-A095C4E8BA67", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", matchCriteriaId: "BA925F96-6DDD-4F71-BF13-710C8A89D860", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*", matchCriteriaId: "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*", matchCriteriaId: "91EB66B4-8F1B-4F35-9371-17FB761997CB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*", matchCriteriaId: "CBDFD1AF-2716-4C95-ADFF-79EFA915C286", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*", matchCriteriaId: "5390A12B-80BD-4889-BF0F-95E65D10D037", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", matchCriteriaId: "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", matchCriteriaId: "05637A96-AF09-4FF5-A918-AB369AA2D1CC", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*", matchCriteriaId: "33FA0279-D587-471E-8EC0-211F78DA4DFD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", matchCriteriaId: "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE9694-F0E7-4B45-82A1-065DA96B9794", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", matchCriteriaId: "DBC93757-5FD7-403D-B5ED-CC8793002352", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", matchCriteriaId: "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", matchCriteriaId: "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", matchCriteriaId: "89421EC5-52E5-441F-AD3B-5C5E964F836D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", matchCriteriaId: "2117880B-FDD4-4A90-B29B-6D840D26645D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8EED1D9-75CC-41E9-9C0C-C648E0717024", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB43A67-9DD7-49E6-BA77-220120C90700", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", matchCriteriaId: "0D3413CB-86D3-4684-B651-DBACC0660E76", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", matchCriteriaId: "FB677676-E793-4158-BF53-3F5ECCECE203", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*", matchCriteriaId: "F32E6092-1AF6-499F-B176-F575E766E8F3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", matchCriteriaId: "E524AFD4-2D9F-4A4B-82F4-13BCDE99041E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*", matchCriteriaId: "39F309BC-6F31-490C-982B-14F9319276F2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", matchCriteriaId: "FA909754-B60A-4B30-AF42-4C8734E155AF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", matchCriteriaId: "EBEFB056-0872-434B-9630-28A1AAEAD470", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", matchCriteriaId: "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", matchCriteriaId: "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", matchCriteriaId: "7FF7E334-6DC7-44B5-A102-649A68300C80", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", matchCriteriaId: "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", matchCriteriaId: "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", matchCriteriaId: "7305838B-84CA-4BB8-A350-B2D2844F1041", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", matchCriteriaId: "D356D196-8AB0-4387-A644-C5E68174A60C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", matchCriteriaId: "89587A92-6234-40C3-83DB-F72319FFBC79", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", matchCriteriaId: "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*", matchCriteriaId: "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", matchCriteriaId: "D557D68C-8279-4BFD-9EA6-17A83754B8FF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", matchCriteriaId: "7ECA0BC9-1CA4-4B95-B98F-9098B2550309", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", matchCriteriaId: "1298CF87-124D-450B-928D-F39CCA2BAF42", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", matchCriteriaId: "AF12820F-A2BE-44BF-A85D-7F4623898DAB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", matchCriteriaId: "853DE44A-84C9-4959-865F-D538DF895647", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", matchCriteriaId: "13326C69-C160-482F-BF28-5425B57BE738", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*", matchCriteriaId: "1F15EF0E-37CF-4944-8B6B-A82B4348CDC0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*", matchCriteriaId: "92D12220-840B-4397-889C-9649F34B7E25", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB926B2-077B-4752-80EC-D39446115FCD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*", matchCriteriaId: "C8C1D750-1FE9-40F8-BCB9-77D13C13906C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", matchCriteriaId: "D07040D2-2ADC-4CC4-860F-74A7C64FD6FB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*", matchCriteriaId: "9BF12F06-D672-40BF-B7A6-1DA3711136F4", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*", matchCriteriaId: "D59D80E8-5A2C-402F-8AE3-766ECEDA14F3", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", matchCriteriaId: "8F66D2E5-BD5B-406D-82A0-4E1E32EDC337", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", matchCriteriaId: "557E240A-6760-434E-9C3A-1E5E9129912D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*", matchCriteriaId: "3D196C46-0F17-4C42-A232-B12CE85D9641", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", matchCriteriaId: "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*", matchCriteriaId: "D3B40170-C992-4386-8429-52A216F64384", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", matchCriteriaId: "C71A52C1-1FBF-4730-8234-700F87D5E74D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*", matchCriteriaId: "9219B34E-F94C-4ECA-85E5-850EBD0F41A1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", matchCriteriaId: "7B930DF9-C425-41AF-9736-0BD611C79CA7", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*", matchCriteriaId: "CCD02FD9-8E63-4B79-8878-07C4316981C8", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*", matchCriteriaId: "5B84F7DC-EE67-4748-8AE2-7070A6F79BAD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", matchCriteriaId: "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", matchCriteriaId: "D78A1CFF-F05E-429C-A9AA-935078574A3B", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*", matchCriteriaId: "FE28AD41-2287-4F2B-924C-30B66A320443", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", matchCriteriaId: "E31FFECA-F663-4B59-9800-1C6A8BD84626", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", matchCriteriaId: "E3F194D4-9425-470E-B812-CD92B5C5A68A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", matchCriteriaId: "6E426811-F97D-42CE-B06D-41CDA84E1B55", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", matchCriteriaId: "4F5F5950-C21F-4142-BA1E-E074FAF249F5", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", matchCriteriaId: "E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", matchCriteriaId: "30EE6B10-84FC-4D9D-8F39-4B7000CC85AF", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", matchCriteriaId: "5AFDA5D5-F00F-40CC-B492-C433200A491C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*", matchCriteriaId: "3BA7061E-E26C-4905-AB41-18267DD32821", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", matchCriteriaId: "8AFC055D-B249-4EB4-8A9F-BE4391A27505", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", matchCriteriaId: "72F91FC3-CF90-450D-9E71-4A301A997921", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", matchCriteriaId: "739731E7-F1BF-4D12-B103-E7F85B35307E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", matchCriteriaId: "7B1C36BE-D4DC-4965-8106-EDA77BDB64DB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", matchCriteriaId: "15B85362-44E5-4107-AC8A-29DEE2A7EEDD", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*", matchCriteriaId: "63293B85-A014-4F23-97EE-6CE3467FCB06", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", matchCriteriaId: "708D6E00-A2E5-4B08-88E7-C872ACFC341D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", matchCriteriaId: "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", matchCriteriaId: "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", matchCriteriaId: "D132291B-AADD-49E3-ADD6-333E1F1D8DFE", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", matchCriteriaId: "2ADF328B-D286-4C36-9F21-11A58D55D03A", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", matchCriteriaId: "C6D23470-A702-426D-A63C-4F7BAC158762", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", matchCriteriaId: "750A77C5-1367-4E04-9ABF-1AB2D46C29C6", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", matchCriteriaId: "D1340A29-3428-4FAD-AA07-7F625915E34D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", matchCriteriaId: "E50CC669-9555-45E9-A43B-05A21FB040E1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", matchCriteriaId: "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", matchCriteriaId: "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", matchCriteriaId: "C39B6A99-7060-4011-8FA3-E5ABE5C02813", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", matchCriteriaId: "DF9E723E-1095-424E-A90D-380CA0D2795E", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", matchCriteriaId: "35380FB9-90FF-405F-8E2E-01C1DD209540", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", matchCriteriaId: "2215D655-0EA9-4530-AB68-7B1C7360D692", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", matchCriteriaId: "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", matchCriteriaId: "AE519C62-F5BB-461C-91EF-2979CD506C63", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", matchCriteriaId: "F693457C-3529-4E62-A672-1B862F235D0F", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*", matchCriteriaId: "CC838E74-665C-4FE3-8F82-8DB2A3B1DEA0", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*", matchCriteriaId: "725E953B-CD85-4451-8D18-40E8D80479AB", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*", matchCriteriaId: "196C11A9-1A63-49A0-918F-4A3F9293FAF1", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*", matchCriteriaId: "0D5A42E1-5CC9-4165-8809-69FB6DF12AD2", vulnerable: true, }, { criteria: "cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*", matchCriteriaId: "7C753C7B-BB62-41C9-BF21-8C653B433FAE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.", }, { lang: "es", value: "Una administración no suficiente del flujo de control en algunos procesadores Intel(R) puede permitir a un usuario autenticado habilitar potencialmente una denegación de servicio por acceso local", }, ], id: "CVE-2021-0127", lastModified: "2024-11-21T05:42:01.320", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-09T23:15:13.817", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220210-0008/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.