Vulnerabilites related to intel - active_management_technology_firmware
cve-2020-0597
Vulnerability from cvelistv5
Published
2020-06-15 13:59
Modified
2024-08-04 06:11
Severity ?
EPSS score ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://www.kb.cert.org/vuls/id/257161 | third-party-advisory, x_refsource_CERT-VN | |
https://www.synology.com/security/advisory/Synology_SA_20_15 | x_refsource_CONFIRM | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT and Intel(R) ISM |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:11:04.733Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "https://www.kb.cert.org/vuls/id/257161", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT and Intel(R) ISM", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-18T12:06:36", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "https://www.kb.cert.org/vuls/id/257161", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-0597", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT and Intel(R) ISM", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", refsource: "CERT-VN", url: "https://www.kb.cert.org/vuls/id/257161", }, { name: "https://www.synology.com/security/advisory/Synology_SA_20_15", refsource: "CONFIRM", url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-0597", datePublished: "2020-06-15T13:59:45", dateReserved: "2019-10-28T00:00:00", dateUpdated: "2024-08-04T06:11:04.733Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-29893
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2025-02-05 20:54
Severity ?
EPSS score ?
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:33:43.116Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-29893", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-29T20:41:41.640882Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-287", description: "CWE-287 Improper Authentication", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-05T20:54:17.483Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25", }, ], }, ], descriptions: [ { lang: "en", value: "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-14T17:45:58.507Z", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2022-29893", datePublished: "2022-11-11T15:48:36.224Z", dateReserved: "2022-05-11T04:14:45.489Z", dateUpdated: "2025-02-05T20:54:17.483Z", requesterUserId: "18e72eb2-8568-4e08-88e2-81b49c53dae3", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-3616
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 16:53
Severity ?
EPSS score ?
Summary
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf | x_refsource_CONFIRM | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05 | x_refsource_MISC | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106996 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180924-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel(R) Active Management Technology |
Version: Versions before 12.0.5. |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T04:50:30.382Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { name: "106996", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106996", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Active Management Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "Versions before 12.0.5.", }, ], }, ], datePublic: "2018-09-11T00:00:00", descriptions: [ { lang: "en", value: "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-02-25T22:57:01", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { name: "106996", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106996", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", DATE_PUBLIC: "2018-09-11T00:00:00", ID: "CVE-2018-3616", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Active Management Technology", version: { version_data: [ { version_value: "Versions before 12.0.5.", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { name: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", refsource: "MISC", url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { name: "106996", refsource: "BID", url: "http://www.securityfocus.com/bid/106996", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { name: "https://security.netapp.com/advisory/ntap-20180924-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-3616", datePublished: "2018-09-12T19:00:00Z", dateReserved: "2017-12-28T00:00:00", dateUpdated: "2024-09-16T16:53:35.507Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12356
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 11:56
Severity ?
EPSS score ?
Summary
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T11:56:51.507Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.", }, ], problemTypes: [ { descriptions: [ { description: "information disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T09:06:18", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-12356", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "information disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { name: "https://security.netapp.com/advisory/ntap-20201113-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-12356", datePublished: "2020-11-12T18:09:24", dateReserved: "2020-04-28T00:00:00", dateUpdated: "2024-08-04T11:56:51.507Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-0097
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K84591451 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Active Management Technology (AMT) |
Version: Versions before 12.0.35. |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:37:07.277Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K84591451", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Active Management Technology (AMT)", vendor: "n/a", versions: [ { status: "affected", version: "Versions before 12.0.35.", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-06-20T15:06:05", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K84591451", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-0097", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Active Management Technology (AMT)", version: { version_data: [ { version_value: "Versions before 12.0.35.", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { name: "https://support.f5.com/csp/article/K84591451", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K84591451", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-0097", datePublished: "2019-05-17T15:41:38", dateReserved: "2018-11-13T00:00:00", dateUpdated: "2024-08-04T17:37:07.277Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-0540
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:02:52.186Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-22T13:47:40", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-0540", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-0540", datePublished: "2020-06-15T14:00:16", dateReserved: "2019-10-28T00:00:00", dateUpdated: "2024-08-04T06:02:52.186Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-0596
Vulnerability from cvelistv5
Published
2020-06-15 13:58
Modified
2024-08-04 06:11
Severity ?
EPSS score ?
Summary
Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://www.synology.com/security/advisory/Synology_SA_20_15 | x_refsource_CONFIRM | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT and Intel(R) ISM |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:11:04.620Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT and Intel(R) ISM", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-22T14:06:47", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-0596", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT and Intel(R) ISM", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://www.synology.com/security/advisory/Synology_SA_20_15", refsource: "CONFIRM", url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-0596", datePublished: "2020-06-15T13:58:14", dateReserved: "2019-10-28T00:00:00", dateUpdated: "2024-08-04T06:11:04.620Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11086
Vulnerability from cvelistv5
Published
2019-12-18 21:10
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:40:16.383Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-18T21:10:11", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11086", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11086", datePublished: "2019-12-18T21:10:11", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:40:16.383Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11088
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:40:16.383Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-18T21:08:03", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11088", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11088", datePublished: "2019-12-18T21:08:03", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:40:16.383Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-0166
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 17:44
Severity ?
EPSS score ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:44:14.624Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-18T21:08:50", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-0166", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-0166", datePublished: "2019-12-18T21:08:50", dateReserved: "2018-11-13T00:00:00", dateUpdated: "2024-08-04T17:44:14.624Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-3658
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 22:35
Severity ?
EPSS score ?
Summary
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf | x_refsource_CONFIRM | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05 | x_refsource_MISC | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106996 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180924-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel(R) Active Management Technology |
Version: Versions before 12.0.5. |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T04:50:30.323Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { name: "106996", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106996", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Active Management Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "Versions before 12.0.5.", }, ], }, ], datePublic: "2018-09-11T00:00:00", descriptions: [ { lang: "en", value: "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-02-25T22:57:01", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { name: "106996", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106996", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", DATE_PUBLIC: "2018-09-11T00:00:00", ID: "CVE-2018-3658", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Active Management Technology", version: { version_data: [ { version_value: "Versions before 12.0.5.", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { name: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", refsource: "MISC", url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { name: "106996", refsource: "BID", url: "http://www.securityfocus.com/bid/106996", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { name: "https://security.netapp.com/advisory/ntap-20180924-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-3658", datePublished: "2018-09-12T19:00:00Z", dateReserved: "2017-12-28T00:00:00", dateUpdated: "2024-09-16T22:35:54.845Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11132
Vulnerability from cvelistv5
Published
2019-12-18 21:07
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.502Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-18T21:07:47", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11132", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11132", datePublished: "2019-12-18T21:07:47", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.502Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11131
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:09.044Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-18T21:08:08", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11131", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11131", datePublished: "2019-12-18T21:08:08", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:09.044Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-33068
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 23:42
Severity ?
EPSS score ?
Summary
Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20220210-0006/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: before versions 15.0.35 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T23:42:19.482Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20220210-0006/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "before versions 15.0.35", }, ], }, ], descriptions: [ { lang: "en", value: "Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: " denial of service ", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-10T09:06:16", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20220210-0006/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2021-33068", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "before versions 15.0.35", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: " denial of service ", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html", }, { name: "https://security.netapp.com/advisory/ntap-20220210-0006/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220210-0006/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2021-33068", datePublished: "2022-02-09T22:04:31", dateReserved: "2021-05-18T00:00:00", dateUpdated: "2024-08-03T23:42:19.482Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-30944
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT and Intel(R) Standard Manageability |
Version: See references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T07:03:39.824Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT and Intel(R) Standard Manageability", vendor: "n/a", versions: [ { status: "affected", version: "See references", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.", }, ], problemTypes: [ { descriptions: [ { description: "information disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-14T00:00:00", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, { url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2022-30944", datePublished: "2022-08-18T00:00:00", dateReserved: "2022-06-09T00:00:00", dateUpdated: "2024-08-03T07:03:39.824Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-8760
Vulnerability from cvelistv5
Published
2020-11-12 18:08
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:12:10.229Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45", }, ], }, ], descriptions: [ { lang: "en", value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.", }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T09:06:16", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-8760", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "escalation of privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { name: "https://security.netapp.com/advisory/ntap-20201113-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-8760", datePublished: "2020-11-12T18:08:03", dateReserved: "2020-02-06T00:00:00", dateUpdated: "2024-08-04T10:12:10.229Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-0595
Vulnerability from cvelistv5
Published
2020-06-15 13:56
Modified
2024-08-04 06:11
Severity ?
EPSS score ?
Summary
Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://www.kb.cert.org/vuls/id/257161 | third-party-advisory, x_refsource_CERT-VN | |
https://www.synology.com/security/advisory/Synology_SA_20_15 | x_refsource_CONFIRM | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT and Intel(R) ISM |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:11:04.554Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "https://www.kb.cert.org/vuls/id/257161", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT and Intel(R) ISM", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-18T12:06:37", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "https://www.kb.cert.org/vuls/id/257161", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-0595", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT and Intel(R) ISM", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", refsource: "CERT-VN", url: "https://www.kb.cert.org/vuls/id/257161", }, { name: "https://www.synology.com/security/advisory/Synology_SA_20_15", refsource: "CONFIRM", url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-0595", datePublished: "2020-06-15T13:56:08", dateReserved: "2019-10-28T00:00:00", dateUpdated: "2024-08-04T06:11:04.554Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-0092
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K84591451 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Active Management Technology (AMT) |
Version: Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35. |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:37:07.199Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K84591451", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Active Management Technology (AMT)", vendor: "n/a", versions: [ { status: "affected", version: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-06-20T15:06:05", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K84591451", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-0092", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Active Management Technology (AMT)", version: { version_data: [ { version_value: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { name: "https://support.f5.com/csp/article/K84591451", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K84591451", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-0092", datePublished: "2019-05-17T15:41:38", dateReserved: "2018-11-13T00:00:00", dateUpdated: "2024-08-04T17:37:07.199Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-30601
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 06:56
Severity ?
EPSS score ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT and Intel(R) Standard Manageability |
Version: See references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:56:12.976Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT and Intel(R) Standard Manageability", vendor: "n/a", versions: [ { status: "affected", version: "See references", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.", }, ], problemTypes: [ { descriptions: [ { description: "information disclosure and escalation of privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-14T00:00:00", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, { url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2022-30601", datePublished: "2022-08-18T00:00:00", dateReserved: "2022-06-09T00:00:00", dateUpdated: "2024-08-03T06:56:12.976Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-8746
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:12:09.493Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, ], descriptions: [ { lang: "en", value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.", }, ], problemTypes: [ { descriptions: [ { description: "denial of service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T09:06:17", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-8746", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "denial of service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { name: "https://security.netapp.com/advisory/ntap-20201113-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-8746", datePublished: "2020-11-12T18:09:33", dateReserved: "2020-02-06T00:00:00", dateUpdated: "2024-08-04T10:12:09.493Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-8749
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:12:09.632Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T09:06:19", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-8749", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "escalation of privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { name: "https://security.netapp.com/advisory/ntap-20201113-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-8749", datePublished: "2020-11-12T18:09:41", dateReserved: "2020-02-06T00:00:00", dateUpdated: "2024-08-04T10:12:09.632Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-5711
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-16 19:20
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.
References
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20171120-0001/ | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039852 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/101918 | vdb-entry, x_refsource_BID | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf | x_refsource_CONFIRM | |
https://www.asus.com/News/wzeltG5CjYaIwGJ0 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Active Management Technology |
Version: 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:11:48.562Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20171120-0001/", }, { name: "1039852", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039852", }, { name: "101918", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101918", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Active Management Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20", }, ], }, ], datePublic: "2017-11-20T00:00:00", descriptions: [ { lang: "en", value: "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-05-10T09:57:01", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20171120-0001/", }, { name: "1039852", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039852", }, { name: "101918", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101918", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", DATE_PUBLIC: "2017-11-20T00:00:00", ID: "CVE-2017-5711", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Active Management Technology", version: { version_data: [ { version_value: "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://security.netapp.com/advisory/ntap-20171120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20171120-0001/", }, { name: "1039852", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039852", }, { name: "101918", refsource: "BID", url: "http://www.securityfocus.com/bid/101918", }, { name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", refsource: "CONFIRM", url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", }, { name: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", refsource: "CONFIRM", url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2017-5711", datePublished: "2017-11-21T14:00:00Z", dateReserved: "2017-02-01T00:00:00", dateUpdated: "2024-09-16T19:20:12.640Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-27497
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2025-02-05 20:54
Severity ?
EPSS score ?
Summary
Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T05:32:57.943Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-27497", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-29T20:40:55.451083Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-05T20:54:25.497Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25", }, ], }, ], descriptions: [ { lang: "en", value: "Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], metrics: [ { cvssV3_1: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "denial of service", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-14T17:45:57.796Z", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2022-27497", datePublished: "2022-11-11T15:48:35.754Z", dateReserved: "2022-04-20T00:10:11.670Z", dateUpdated: "2025-02-05T20:54:25.497Z", requesterUserId: "e1538295-92a9-4bd5-bb63-88a76fc3a35c", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-0096
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K84591451 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Active Management Technology (AMT) |
Version: Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35. |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:37:07.542Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K84591451", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Active Management Technology (AMT)", vendor: "n/a", versions: [ { status: "affected", version: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.", }, ], }, ], descriptions: [ { lang: "en", value: "Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-06-20T15:06:05", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K84591451", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-0096", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Active Management Technology (AMT)", version: { version_data: [ { version_value: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { name: "https://support.f5.com/csp/article/K84591451", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K84591451", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-0096", datePublished: "2019-05-17T15:41:38", dateReserved: "2018-11-13T00:00:00", dateUpdated: "2024-08-04T17:37:07.542Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-8754
Vulnerability from cvelistv5
Published
2020-11-12 18:08
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT, Intel(R) ISM |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:12:10.593Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT, Intel(R) ISM", vendor: "n/a", versions: [ { status: "affected", version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "information disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T09:06:16", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-8754", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT, Intel(R) ISM", version: { version_data: [ { version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "information disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { name: "https://security.netapp.com/advisory/ntap-20201113-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-8754", datePublished: "2020-11-12T18:08:35", dateReserved: "2020-02-06T00:00:00", dateUpdated: "2024-08-04T10:12:10.593Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-8747
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:12:09.650Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "information disclosure and/or denial of service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T09:06:20", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-8747", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "information disclosure and/or denial of service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { name: "https://security.netapp.com/advisory/ntap-20201113-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-8747", datePublished: "2020-11-12T18:09:04", dateReserved: "2020-02-06T00:00:00", dateUpdated: "2024-08-04T10:12:09.650Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-26845
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2025-02-05 20:54
Severity ?
EPSS score ?
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T05:11:44.541Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-26845", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-29T20:41:44.275582Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-287", description: "CWE-287 Improper Authentication", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-05T20:54:33.714Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25", }, ], }, ], descriptions: [ { lang: "en", value: "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], metrics: [ { cvssV3_1: { baseScore: 8.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-14T17:45:57.128Z", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2022-26845", datePublished: "2022-11-11T15:48:35.294Z", dateReserved: "2022-04-05T15:12:32.582Z", dateUpdated: "2025-02-05T20:54:33.714Z", requesterUserId: "524a9a6b-3515-4b97-ab85-1a9a79493852", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-0531
Vulnerability from cvelistv5
Published
2020-06-15 13:59
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:02:52.183Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-22T13:40:14", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-0531", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-0531", datePublished: "2020-06-15T13:59:53", dateReserved: "2019-10-28T00:00:00", dateUpdated: "2024-08-04T06:02:52.183Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-5729
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-17 04:24
Severity ?
EPSS score ?
Summary
Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.
References
▼ | URL | Tags |
---|---|---|
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Dual-Band Wireless-AC and Tri-Band Wireless-AC |
Version: 18.x.x.x/19.10.x/19.51.x.x/20.0.x.x |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:11:48.897Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Dual-Band Wireless-AC and Tri-Band Wireless-AC", vendor: "Intel Corporation", versions: [ { status: "affected", version: "18.x.x.x/19.10.x/19.51.x.x/20.0.x.x", }, ], }, ], datePublic: "2017-11-20T00:00:00", descriptions: [ { lang: "en", value: "Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-21T13:57:01", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", DATE_PUBLIC: "2017-11-20T00:00:00", ID: "CVE-2017-5729", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Dual-Band Wireless-AC and Tri-Band Wireless-AC", version: { version_data: [ { version_value: "18.x.x.x/19.10.x/19.51.x.x/20.0.x.x", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr", refsource: "CONFIRM", url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2017-5729", datePublished: "2017-11-21T14:00:00Z", dateReserved: "2017-02-01T00:00:00", dateUpdated: "2024-09-17T04:24:40.560Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-5689
Vulnerability from cvelistv5
Published
2017-05-02 14:00
Modified
2025-02-07 13:44
Severity ?
EPSS score ?
Summary
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
References
▼ | URL | Tags |
---|---|---|
https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability | x_refsource_MISC | |
https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/98269 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038385 | vdb-entry, x_refsource_SECTRACK | |
https://security.netapp.com/advisory/ntap-20170509-0001/ | x_refsource_CONFIRM | |
https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf | x_refsource_MISC | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr | x_refsource_CONFIRM | |
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us | x_refsource_CONFIRM | |
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html | x_refsource_CONFIRM | |
https://www.embedi.com/news/mythbusters-cve-2017-5689 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability |
Version: fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:11:48.401Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf", }, { name: "98269", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/98269", }, { name: "1038385", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038385", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20170509-0001/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.embedi.com/news/mythbusters-cve-2017-5689", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2017-5689", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-07T13:43:44.728208Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-01-28", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-5689", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-269", description: "CWE-269 Improper Privilege Management", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-07T13:44:05.635Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability", vendor: "Intel Corporation", versions: [ { status: "affected", version: "fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later", }, ], }, ], datePublic: "2017-05-01T00:00:00.000Z", descriptions: [ { lang: "en", value: "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:25.000Z", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf", }, { name: "98269", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/98269", }, { name: "1038385", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038385", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20170509-0001/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.embedi.com/news/mythbusters-cve-2017-5689", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2017-5689", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability", version: { version_data: [ { version_value: "fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability", refsource: "MISC", url: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability", }, { name: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf", refsource: "CONFIRM", url: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf", }, { name: "98269", refsource: "BID", url: "http://www.securityfocus.com/bid/98269", }, { name: "1038385", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038385", }, { name: "https://security.netapp.com/advisory/ntap-20170509-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20170509-0001/", }, { name: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf", refsource: "MISC", url: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf", }, { name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr", refsource: "CONFIRM", url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr", }, { name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "https://www.embedi.com/news/mythbusters-cve-2017-5689", refsource: "MISC", url: "https://www.embedi.com/news/mythbusters-cve-2017-5689", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2017-5689", datePublished: "2017-05-02T14:00:00.000Z", dateReserved: "2017-02-01T00:00:00.000Z", dateUpdated: "2025-02-07T13:44:05.635Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-12187
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-17 02:26
Severity ?
EPSS score ?
Summary
Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190318-0001/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology |
Version: Multiple versions. |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:30:59.347Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20190318-0001/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "Multiple versions.", }, ], }, ], datePublic: "2019-03-12T00:00:00", descriptions: [ { lang: "en", value: "Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-18T06:06:06", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20190318-0001/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", DATE_PUBLIC: "2019-03-12T00:00:00", ID: "CVE-2018-12187", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology", version: { version_data: [ { version_value: "Multiple versions.", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html", }, { name: "https://security.netapp.com/advisory/ntap-20190318-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190318-0001/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-12187", datePublished: "2019-03-14T20:00:00Z", dateReserved: "2018-06-11T00:00:00", dateUpdated: "2024-09-17T02:26:25.035Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-8752
Vulnerability from cvelistv5
Published
2020-11-12 18:05
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT, Intel(R) ISM versions |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:12:09.645Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT, Intel(R) ISM versions", vendor: "n/a", versions: [ { status: "affected", version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.", }, ], problemTypes: [ { descriptions: [ { description: "escalation of privileges", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T09:06:21", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-8752", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT, Intel(R) ISM versions", version: { version_data: [ { version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "escalation of privileges", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { name: "https://security.netapp.com/advisory/ntap-20201113-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-8752", datePublished: "2020-11-12T18:05:24", dateReserved: "2020-02-06T00:00:00", dateUpdated: "2024-08-04T10:12:09.645Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-3657
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 20:01
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf | x_refsource_CONFIRM | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05 | x_refsource_MISC | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106996 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180924-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel(R) Active Management Technology |
Version: Versions before version 12.0.5. |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T04:50:30.304Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { name: "106996", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106996", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Active Management Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "Versions before version 12.0.5.", }, ], }, ], datePublic: "2018-09-11T00:00:00", descriptions: [ { lang: "en", value: "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-02-25T22:57:01", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { name: "106996", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106996", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", DATE_PUBLIC: "2018-09-11T00:00:00", ID: "CVE-2018-3657", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Active Management Technology", version: { version_data: [ { version_value: "Versions before version 12.0.5.", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { name: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", refsource: "MISC", url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { name: "106996", refsource: "BID", url: "http://www.securityfocus.com/bid/106996", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { name: "https://security.netapp.com/advisory/ntap-20180924-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-3657", datePublished: "2018-09-12T19:00:00Z", dateReserved: "2017-12-28T00:00:00", dateUpdated: "2024-09-16T20:01:21.908Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-0535
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:02:52.206Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-22T13:41:53", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-0535", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-0535", datePublished: "2020-06-15T14:00:01", dateReserved: "2019-10-28T00:00:00", dateUpdated: "2024-08-04T06:02:52.206Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-0538
Vulnerability from cvelistv5
Published
2020-06-15 13:58
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:02:52.327Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-22T13:20:30", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-0538", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-0538", datePublished: "2020-06-15T13:58:27", dateReserved: "2019-10-28T00:00:00", dateUpdated: "2024-08-04T06:02:52.327Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-8753
Vulnerability from cvelistv5
Published
2020-11-12 18:05
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT, Intel(R) ISM versions |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:12:09.616Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT, Intel(R) ISM versions", vendor: "n/a", versions: [ { status: "affected", version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "information disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T09:06:20", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-8753", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT, Intel(R) ISM versions", version: { version_data: [ { version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "information disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { name: "https://security.netapp.com/advisory/ntap-20201113-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-8753", datePublished: "2020-11-12T18:05:32", dateReserved: "2020-02-06T00:00:00", dateUpdated: "2024-08-04T10:12:09.616Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-5698
Vulnerability from cvelistv5
Published
2017-09-05 19:00
Modified
2024-09-16 17:38
Severity ?
EPSS score ?
Summary
Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.
References
▼ | URL | Tags |
---|---|---|
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology |
Version: version 11.0.25.3001 and 11.0.26.3000 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:11:48.556Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "version 11.0.25.3001 and 11.0.26.3000", }, ], }, ], datePublic: "2017-09-28T00:00:00", descriptions: [ { lang: "en", value: "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-28T19:57:01", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", DATE_PUBLIC: "2017-09-28T00:00:00", ID: "CVE-2017-5698", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology", version: { version_data: [ { version_value: "version 11.0.25.3001 and 11.0.26.3000", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr", refsource: "CONFIRM", url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2017-5698", datePublished: "2017-09-05T19:00:00Z", dateReserved: "2017-02-01T00:00:00", dateUpdated: "2024-09-16T17:38:42.112Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-8757
Vulnerability from cvelistv5
Published
2020-11-12 18:07
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:12:10.134Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.", }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T09:06:21", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-8757", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "escalation of privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { name: "https://security.netapp.com/advisory/ntap-20201113-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-8757", datePublished: "2020-11-12T18:07:38", dateReserved: "2020-02-06T00:00:00", dateUpdated: "2024-08-04T10:12:10.134Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11100
Vulnerability from cvelistv5
Published
2019-12-18 21:09
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:40:16.330Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-18T21:09:20", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11100", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11100", datePublished: "2019-12-18T21:09:20", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:40:16.330Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-3628
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
EPSS score ?
Summary
Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1041362 | vdb-entry, x_refsource_SECTRACK | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190327-0001/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel Active Management Technology |
Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T04:50:30.347Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1041362", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041362", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel Active Management Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x", }, ], }, ], datePublic: "2018-07-10T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-27T18:06:08", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "1041362", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041362", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2018-3628", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel Active Management Technology", version: { version_data: [ { version_value: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "1041362", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041362", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { name: "https://security.netapp.com/advisory/ntap-20190327-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-3628", datePublished: "2018-07-10T21:00:00", dateReserved: "2017-12-28T00:00:00", dateUpdated: "2024-08-05T04:50:30.347Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11107
Vulnerability from cvelistv5
Published
2019-12-18 21:09
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.655Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-18T21:09:47", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11107", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11107", datePublished: "2019-12-18T21:09:47", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.655Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-3629
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
EPSS score ?
Summary
Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1041362 | vdb-entry, x_refsource_SECTRACK | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190327-0001/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel Active Management Technology |
Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T04:50:30.326Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1041362", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041362", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel Active Management Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x", }, ], }, ], datePublic: "2018-07-10T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-27T18:06:09", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "1041362", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041362", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2018-3629", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel Active Management Technology", version: { version_data: [ { version_value: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "1041362", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041362", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { name: "https://security.netapp.com/advisory/ntap-20190327-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-3629", datePublished: "2018-07-10T21:00:00", dateReserved: "2017-12-28T00:00:00", dateUpdated: "2024-08-05T04:50:30.326Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-3632
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
EPSS score ?
Summary
Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1041362 | vdb-entry, x_refsource_SECTRACK | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190327-0001/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel Active Management Technology |
Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T04:50:30.208Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1041362", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041362", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel Active Management Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x", }, ], }, ], datePublic: "2018-07-10T00:00:00", descriptions: [ { lang: "en", value: "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-27T18:06:09", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "1041362", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041362", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2018-3632", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel Active Management Technology", version: { version_data: [ { version_value: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "1041362", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041362", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { name: "https://security.netapp.com/advisory/ntap-20190327-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-3632", datePublished: "2018-07-10T21:00:00", dateReserved: "2017-12-28T00:00:00", dateUpdated: "2024-08-05T04:50:30.208Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-8758
Vulnerability from cvelistv5
Published
2020-09-10 14:22
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200911-0005/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT and Intel(R) ISM |
Version: Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:12:10.441Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200911-0005/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT and Intel(R) ISM", vendor: "n/a", versions: [ { status: "affected", version: "Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39", }, ], }, ], descriptions: [ { lang: "en", value: "Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-09-11T12:06:34", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200911-0005/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-8758", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT and Intel(R) ISM", version: { version_data: [ { version_value: "Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html", }, { name: "https://security.netapp.com/advisory/ntap-20200911-0005/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200911-0005/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-8758", datePublished: "2020-09-10T14:22:14", dateReserved: "2020-02-06T00:00:00", dateUpdated: "2024-08-04T10:12:10.441Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-0131
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 17:44
Severity ?
EPSS score ?
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:44:14.595Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-18T21:08:32", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-0131", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-0131", datePublished: "2019-12-18T21:08:32", dateReserved: "2018-11-13T00:00:00", dateUpdated: "2024-08-04T17:44:14.595Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-0532
Vulnerability from cvelistv5
Published
2020-06-15 13:59
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:02:52.183Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-22T13:18:57", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-0532", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-0532", datePublished: "2020-06-15T13:59:22", dateReserved: "2019-10-28T00:00:00", dateUpdated: "2024-08-04T06:02:52.183Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-33159
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2025-02-05 20:54
Severity ?
EPSS score ?
Summary
Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T23:42:20.015Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-33159", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-29T20:39:15.361042Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-287", description: "CWE-287 Improper Authentication", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-05T20:54:08.124Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25", }, ], }, ], descriptions: [ { lang: "en", value: "Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.", }, ], metrics: [ { cvssV3_1: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-14T17:45:59.209Z", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2021-33159", datePublished: "2022-11-11T15:48:36.704Z", dateReserved: "2021-05-18T00:31:17.246Z", dateUpdated: "2025-02-05T20:54:08.124Z", requesterUserId: "520cc88b-a1c8-44f6-9154-21a4d74c769f", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-8674
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://www.kb.cert.org/vuls/id/257161 | third-party-advisory, x_refsource_CERT-VN | |
https://www.synology.com/security/advisory/Synology_SA_20_15 | x_refsource_CONFIRM | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT and Intel(R) ISM |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:03:46.339Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "https://www.kb.cert.org/vuls/id/257161", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT and Intel(R) ISM", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-18T12:06:38", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "https://www.kb.cert.org/vuls/id/257161", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-8674", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT and Intel(R) ISM", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", refsource: "CERT-VN", url: "https://www.kb.cert.org/vuls/id/257161", }, { name: "https://www.synology.com/security/advisory/Synology_SA_20_15", refsource: "CONFIRM", url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-8674", datePublished: "2020-06-15T14:00:54", dateReserved: "2020-02-06T00:00:00", dateUpdated: "2024-08-04T10:03:46.339Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-5712
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-16 23:21
Severity ?
EPSS score ?
Summary
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.
References
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20171120-0001/ | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039852 | vdb-entry, x_refsource_SECTRACK | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101920 | vdb-entry, x_refsource_BID | |
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf | x_refsource_CONFIRM | |
https://www.asus.com/News/wzeltG5CjYaIwGJ0 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Active Management Technology |
Version: 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:11:48.603Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20171120-0001/", }, { name: "1039852", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039852", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", }, { name: "101920", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101920", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Active Management Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20", }, ], }, ], datePublic: "2017-11-20T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-05-10T09:57:01", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20171120-0001/", }, { name: "1039852", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039852", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", }, { name: "101920", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101920", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", DATE_PUBLIC: "2017-11-20T00:00:00", ID: "CVE-2017-5712", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Active Management Technology", version: { version_data: [ { version_value: "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://security.netapp.com/advisory/ntap-20171120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20171120-0001/", }, { name: "1039852", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039852", }, { name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", refsource: "CONFIRM", url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", }, { name: "101920", refsource: "BID", url: "http://www.securityfocus.com/bid/101920", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", }, { name: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", refsource: "CONFIRM", url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2017-5712", datePublished: "2017-11-21T14:00:00Z", dateReserved: "2017-02-01T00:00:00", dateUpdated: "2024-09-16T23:21:05.833Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-0094
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K84591451 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Active Management Technology (AMT) |
Version: Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35. |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:37:07.287Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K84591451", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Active Management Technology (AMT)", vendor: "n/a", versions: [ { status: "affected", version: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-06-20T15:06:05", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K84591451", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-0094", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Active Management Technology (AMT)", version: { version_data: [ { version_value: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { name: "https://support.f5.com/csp/article/K84591451", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K84591451", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-0094", datePublished: "2019-05-17T15:41:38", dateReserved: "2018-11-13T00:00:00", dateUpdated: "2024-08-04T17:37:07.287Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-0594
Vulnerability from cvelistv5
Published
2020-06-15 13:55
Modified
2024-08-04 06:11
Severity ?
EPSS score ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://www.kb.cert.org/vuls/id/257161 | third-party-advisory, x_refsource_CERT-VN | |
https://www.synology.com/security/advisory/Synology_SA_20_15 | x_refsource_CONFIRM | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT and Intel(R) ISM |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:11:04.539Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "https://www.kb.cert.org/vuls/id/257161", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT and Intel(R) ISM", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-18T12:06:37", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "https://www.kb.cert.org/vuls/id/257161", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-0594", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT and Intel(R) ISM", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "VU#257161", refsource: "CERT-VN", url: "https://www.kb.cert.org/vuls/id/257161", }, { name: "https://www.synology.com/security/advisory/Synology_SA_20_15", refsource: "CONFIRM", url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-0594", datePublished: "2020-06-15T13:55:42", dateReserved: "2019-10-28T00:00:00", dateUpdated: "2024-08-04T06:11:04.539Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-5697
Vulnerability from cvelistv5
Published
2017-06-14 12:00
Modified
2024-08-05 15:11
Severity ?
EPSS score ?
Summary
Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.
References
▼ | URL | Tags |
---|---|---|
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Active Mangement Technology |
Version: before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:11:48.546Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Active Mangement Technology", vendor: "Intel Corporation", versions: [ { status: "affected", version: "before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129", }, ], }, ], datePublic: "2017-06-05T00:00:00", descriptions: [ { lang: "en", value: "Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-14T12:57:01", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2017-5697", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Active Mangement Technology", version: { version_data: [ { version_value: "before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129", }, ], }, }, ], }, vendor_name: "Intel Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr", refsource: "CONFIRM", url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2017-5697", datePublished: "2017-06-14T12:00:00", dateReserved: "2017-02-01T00:00:00", dateUpdated: "2024-08-05T15:11:48.546Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-28697
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 06:03
Severity ?
EPSS score ?
Summary
Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT and Intel(R) Standard Manageability |
Version: See references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:03:52.067Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT and Intel(R) Standard Manageability", vendor: "n/a", versions: [ { status: "affected", version: "See references", }, ], }, ], descriptions: [ { lang: "en", value: "Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.", }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-14T00:00:00", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, { url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2022-28697", datePublished: "2022-08-18T00:00:00", dateReserved: "2022-06-09T00:00:00", dateUpdated: "2024-08-03T06:03:52.067Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-0537
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) AMT |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:02:52.189Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) AMT", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-22T13:38:40", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { tags: [ "x_refsource_MISC", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-0537", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) AMT", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "CONFIRM", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://security.netapp.com/advisory/ntap-20200611-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { name: "https://support.lenovo.com/de/en/product_security/len-30041", refsource: "MISC", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-0537", datePublished: "2020-06-15T14:00:32", dateReserved: "2019-10-28T00:00:00", dateUpdated: "2024-08-04T06:02:52.189Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15", versionEndExcluding: "11.8.70", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", versionEndExcluding: "11.11.70", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43", versionEndExcluding: "11.22.70", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853", versionEndExcluding: "12.0.45", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, { lang: "es", value: "Un problema lógico en el subsistema para Intel(R) AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso de red.", }, ], id: "CVE-2019-11131", lastModified: "2024-11-21T04:20:35.260", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-18T22:15:13.283", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.", }, { lang: "es", value: "Un desbordamiento de enteros en el subsistema para Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una denegación de servicio por medio de un acceso adyacente", }, ], id: "CVE-2020-8746", lastModified: "2024-11-21T05:39:22.340", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:17.377", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-08-18 21:15
Modified
2024-11-21 07:03
Severity ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | standard_manageability | * | |
intel | active_management_technology_firmware | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "5FA8EEF7-DACD-45B8-92A2-CE363D4EDE23", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F802F5D5-BAF0-4246-BEAD-9227BF50EE88", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.", }, { lang: "es", value: "Unas credenciales insuficientemente protegidas para Intel(R) AMT e Intel(R) Standard Manageability pueden permitir que un usuario no autenticado permita potencialmente la divulgación de información y la escalada de privilegios por medio del acceso a la red.", }, ], id: "CVE-2022-30601", lastModified: "2024-11-21T07:03:00.420", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-08-18T21:15:08.557", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, { source: "secure@intel.com", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-522", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-06-14 12:29
Modified
2024-11-21 03:28
Severity ?
Summary
Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "128CB305-59C6-40A9-9E0E-815BC1F1FFE3", versionEndExcluding: "9.1.40.1000", versionStartIncluding: "9.1", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9784196C-F8D7-4F68-BC88-12C34F0F748C", versionEndExcluding: "9.5.60.1952", versionStartIncluding: "9.5", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E75ED508-CF5D-4FEF-8DDC-791691BA9E17", versionEndExcluding: "10.0.50.1004", versionStartIncluding: "10.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C02C097C-9B6F-4420-A89E-BA2E0BC94074", versionEndExcluding: "11.0.0.1205", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C69D06FF-7A9E-4ADD-BF92-597053ADBD9D", versionEndExcluding: "11.6.25.1129", versionStartIncluding: "11.6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.", }, { lang: "es", value: "Protección insuficiente contra el secuestro de la acción click en la Interfaz de usuario web de Intel AMT versiones de firmware anteriores a 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205 y 11.6.25.1129, que potencialmente permiten a un atacante remoto secuestrar los cliqueos web de los usuarios por medio de la página web especialmente diseñada.", }, ], id: "CVE-2017-5697", lastModified: "2024-11-21T03:28:14.573", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-06-14T12:29:00.177", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-1021", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "503E551C-FC5F-4ABC-8DEA-E360701F0B33", versionEndExcluding: "22.01.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", matchCriteriaId: "506DEE00-30D2-4E29-9645-757EB8778C0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", versionEndExcluding: "21.01.09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", matchCriteriaId: "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B5B6E6B-16A0-4236-AABE-82385B53EC78", versionEndExcluding: "21.01.09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", matchCriteriaId: "FDF9D4C3-1892-48FA-95B4-835B636A4005", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D476D093-4A97-499C-B40D-7A301BC9AA2E", versionEndExcluding: "r1.30.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", matchCriteriaId: "F6A757F1-E478-4A3D-8D5F-C996E176A11A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D", versionEndExcluding: "r1.23.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", matchCriteriaId: "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "790D244A-AC3D-4BBC-9139-A90048FD375A", versionEndExcluding: "19.02.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", matchCriteriaId: "509AD120-3465-4C00-AAB3-B6F6ED708B51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C046182-BB33-41D0-B041-1566B8041917", versionEndExcluding: "19.01.14", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", matchCriteriaId: "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8DE74300-E061-452E-AD1D-6DD7C2C62729", versionEndExcluding: "19.02.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", matchCriteriaId: "057D9947-CE4A-4B4C-B721-4B29FB71350C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE4A7C13-6F81-4629-9C28-9202028634AE", versionEndExcluding: "19.02.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", matchCriteriaId: "E6D87239-40C1-4038-B734-D77AC4DDD571", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93485235-481B-4BAF-BB7A-81BB5AA1BC53", versionEndExcluding: "19.01.14", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", matchCriteriaId: "D8F37D88-E086-4060-8420-BD0F8D8FF580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AD949046-46E5-48C9-883B-92F04926E8BC", versionEndExcluding: "23.01.04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", matchCriteriaId: "187C6D51-5B86-484D-AE0F-26D1C9465580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C23AFAB4-B286-4FD6-ABC3-86B2881E271C", versionEndExcluding: "12.0.5", versionStartIncluding: "11.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D5FAD938-027A-406F-9E7C-1BFD992839F4", versionEndExcluding: "12.0.5", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63591E72-6038-4417-BA10-54180507AF0F", versionEndExcluding: "11.0", versionStartIncluding: "9.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.", }, { lang: "es", value: "Múltiples desbordamientos de búfer en Intel AMT en el firmware Intel CSME en versiones anteriores a la 12.0.5 podrían permitir que un usuario privilegiado ejecute código arbitrario con privilegios de ejecución AMT mediante acceso local.", }, ], id: "CVE-2018-3657", lastModified: "2024-11-21T04:05:50.857", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-09-12T19:29:02.840", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106996", }, { source: "secure@intel.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106996", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0FD2059-FA89-4010-89C3-1B5BD11E882B", versionEndExcluding: "11.8.65", versionStartIncluding: "11.8.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6A856CF2-8F1D-47C1-939A-F86919F3C2D0", versionEndExcluding: "11.11.65", versionStartIncluding: "11.11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B6C8C1CA-C2EF-485B-A711-426CFBDE5AA5", versionEndExcluding: "11.22.65", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9FED09AD-4EEE-4D93-A7EA-DC96F706814F", versionEndExcluding: "12.0.35", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.", }, { lang: "es", value: "Una vulnerabilidad por insuficiente validación de entrada en el subsistema para Intel (R) AMT anterior a las versiones 11.8.65, 11.11.65, 11.22.65, 12.0.35 puede permitir a un usuario no autenticado habilitar potencialmente la denegación de servicio a través del acceso a la red adyacente.", }, ], id: "CVE-2019-0094", lastModified: "2024-11-21T04:16:13.243", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-17T16:29:01.203", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K84591451", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K84591451", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1A288FA3-B8DE-48C0-ACB3-2CB0C2F212AF", versionEndExcluding: "14.0.33", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "F18CD125-5319-4955-ADEA-24073521E975", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B907926D-451E-4435-AEC2-2E5DBA695AE7", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "564A5BEF-C36A-4D8E-B458-D3083294AFCD", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "A433A19A-BBC9-4A5A-8D55-31371F91ABDA", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "AAEB6ABB-9539-44C2-9177-DFB20AAA4274", versionEndExcluding: "14.0.33", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Una lectura fuera de límite en el subsistema DHCPv6 en Intel® AMT e Intel® ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77, 12.0.64 y 14.0.33, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red", }, ], id: "CVE-2020-8674", lastModified: "2024-11-21T05:39:14.073", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:12.440", references: [ { source: "secure@intel.com", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", url: "https://www.kb.cert.org/vuls/id/257161", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.kb.cert.org/vuls/id/257161", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15", versionEndExcluding: "11.8.70", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", versionEndExcluding: "11.11.70", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43", versionEndExcluding: "11.22.70", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853", versionEndExcluding: "12.0.45", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red.", }, ], id: "CVE-2019-0166", lastModified: "2024-11-21T04:16:23.620", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-18T22:15:11.770", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.", }, { lang: "es", value: "Una lectura fuera de límites en el subsistema para Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información y/o la negación de servicio por medio de un acceso de red", }, ], id: "CVE-2020-8747", lastModified: "2024-11-21T05:39:22.437", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:17.457", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15", versionEndExcluding: "11.8.70", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", versionEndExcluding: "11.11.70", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43", versionEndExcluding: "11.22.70", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853", versionEndExcluding: "12.0.45", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.", }, { lang: "es", value: "Una vulnerabilidad de tipo cross site scripting en el subsistema para Intel(R) AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario privilegiado habilitar una escalada de privilegios por medio de un acceso de red.", }, ], id: "CVE-2019-11132", lastModified: "2024-11-21T04:20:35.367", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.7, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-18T22:15:13.377", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Severity ?
Summary
Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*", matchCriteriaId: "8F249992-79C7-4005-9804-97FFFAC658E7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*", matchCriteriaId: "81C6DAFF-FD39-434C-8426-4BE5F39355EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*", matchCriteriaId: "2EE259EF-22F6-4AA1-BDF6-448E15B96F14", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*", matchCriteriaId: "EFED12C9-2563-4036-BEBC-DD9D67095917", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*", matchCriteriaId: "18155178-43F1-48A6-AC0E-9578031F7F04", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*", matchCriteriaId: "4C47688B-1D40-4D73-B363-E2E8230588FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*", matchCriteriaId: "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*", matchCriteriaId: "72BF929E-1288-448A-83A4-D26D86D26EF9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*", matchCriteriaId: "C8E4CB07-1768-4C18-ACAD-73773042C752", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*", matchCriteriaId: "31465D8E-A705-4AE3-AB2A-C296554E514C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*", matchCriteriaId: "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*", matchCriteriaId: "D8B2D356-DD32-46E0-9459-67E10AE44104", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*", matchCriteriaId: "27CDF6AC-7356-417F-84F6-33E9E3AA2082", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*", matchCriteriaId: "E8E6F0AF-78AC-4257-9164-A9A4CCA05968", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*", matchCriteriaId: "5DA61740-3E29-4820-9897-9BCB90490D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*", matchCriteriaId: "633350BA-34B4-4927-82B9-B44D1286D8FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*", matchCriteriaId: "D2E687A6-87AA-4F3A-98AB-A164EC0EE051", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*", matchCriteriaId: "53A8F993-32F4-487A-A33D-814BCDF1FAB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*", matchCriteriaId: "09EC7A10-C2AB-4DD4-9C75-073344F635E9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*", matchCriteriaId: "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*", matchCriteriaId: "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*", matchCriteriaId: "0C83B3D2-E293-4D33-AE5B-1789466696DB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*", matchCriteriaId: "CB399F3F-7C6E-463E-B822-A4365A4C290A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*", matchCriteriaId: "F5175C41-110B-4C26-80CB-C25DA11F639B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*", matchCriteriaId: "63DAF721-A7E8-4263-869D-D9E100D7C598", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*", matchCriteriaId: "F79057F7-72D3-4176-BBDD-E9A362153E66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*", matchCriteriaId: "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*", matchCriteriaId: "FD65648B-B7DB-432F-8F88-6C624F94F809", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*", matchCriteriaId: "7A949D34-E086-4821-B73A-DCCFDD6C5616", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*", matchCriteriaId: "93055544-064D-46FE-92E4-48F69DDD29B8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*", matchCriteriaId: "9A98184C-18F5-424C-BB74-9A8094B5992C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*", matchCriteriaId: "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*", matchCriteriaId: "3EB52214-6E22-49BF-B2F6-0AA282108E0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*", matchCriteriaId: "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*", matchCriteriaId: "F8E0DA72-76B5-4022-BBFA-B886F0F662CE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*", matchCriteriaId: "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*", matchCriteriaId: "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*", matchCriteriaId: "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*", matchCriteriaId: "0F67F016-A068-4079-AAE5-B247BBAE1B2A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*", matchCriteriaId: "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*", matchCriteriaId: "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*", matchCriteriaId: "DD57E072-FF46-4637-B7CF-D6C2F3BA8782", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*", matchCriteriaId: "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*", matchCriteriaId: "4B18E14C-4DC4-4AEB-8792-968D893BA402", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*", matchCriteriaId: "B706F7E4-8169-48A5-86D1-3592D3D9B845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*", matchCriteriaId: "808DAAA6-9047-49A1-BC0B-9D4725299CA2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*", matchCriteriaId: "57EFA3F2-5C76-48AF-931F-7463633370A5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*", matchCriteriaId: "A6FF59F0-9F30-448F-A109-B90FCC513CBD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*", matchCriteriaId: "07EFB7B3-772A-476D-B30F-2A442F64928F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*", matchCriteriaId: "41A69B9F-EF79-4642-A2A8-75395AD7506E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*", matchCriteriaId: "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*", matchCriteriaId: "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*", matchCriteriaId: "6C6D7877-1990-481F-9CFF-81A2BD39DA6F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*", matchCriteriaId: "6A17D56F-D53C-4198-B7EF-95BAA4711B3B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*", matchCriteriaId: "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*", matchCriteriaId: "E13892FB-C1D0-4C46-A171-9D055E58DE0B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*", matchCriteriaId: "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*", matchCriteriaId: "DB830245-29AF-4F0E-9C12-6BED7E76609D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*", matchCriteriaId: "17ACD170-347E-4DF5-AE0D-DF00854480A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*", matchCriteriaId: "3B8BCF08-D863-435F-9E70-78C7542A3C0C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*", matchCriteriaId: "9E57F037-EE11-4148-A214-0650A98A07F4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*", matchCriteriaId: "F641F2A7-64C7-43DB-862B-B7117E1B9CBC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*", matchCriteriaId: "51086E20-8A3D-4A68-8048-D385865D50FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*", matchCriteriaId: "2621BF41-EFD1-4C8A-9426-A937B68DC71E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*", matchCriteriaId: "713DC902-5264-42CB-BB22-3566A4528FED", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*", matchCriteriaId: "28554810-9989-47B2-9CF1-E421D534777E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*", matchCriteriaId: "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*", matchCriteriaId: "4DD23345-C583-4E30-A9FE-B0C485606ECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*", matchCriteriaId: "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*", matchCriteriaId: "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*", matchCriteriaId: "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*", matchCriteriaId: "E8BBEBBD-8F88-474B-A40B-7270B500AAC2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*", matchCriteriaId: "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*", matchCriteriaId: "7471E5CD-7211-474C-856F-51C199479407", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*", matchCriteriaId: "E785FA6F-A7BE-46A3-B384-029E55793DDA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*", matchCriteriaId: "2A3A4148-B91B-4799-B055-21F4A7FA74A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*", matchCriteriaId: "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*", matchCriteriaId: "353E8397-B63B-4879-9D3D-610F65929184", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*", matchCriteriaId: "D91D2C07-10D0-49F0-B353-19E34C438CEC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*", matchCriteriaId: "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*", matchCriteriaId: "F18363D9-C7D8-4C9F-9A50-33725FFE6558", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*", matchCriteriaId: "267E5275-7D50-4EF6-AB1D-7ECA894ED71B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*", matchCriteriaId: "06B91A77-76F0-41CA-B23B-69F431F0D1AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*", matchCriteriaId: "D9F01332-C259-4F3B-ABE9-C34DAC18FC18", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*", matchCriteriaId: "B9EA80D9-6A3B-42AF-B609-7429755BE504", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*", matchCriteriaId: "40B500EC-20B8-42D2-A5DF-956C96FBEB12", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*", matchCriteriaId: "D55B01E2-6783-494E-BCB9-C75D2CA042D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*", matchCriteriaId: "8D31A976-9C00-42AC-8DA1-D8B39564F456", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*", matchCriteriaId: "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*", matchCriteriaId: "A90F5756-47A1-4512-848E-3070E42506EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*", matchCriteriaId: "FDB161B7-D329-41FB-97C3-2C1EB16F74C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", matchCriteriaId: "03D0265F-840B-45A1-90BD-9ED8846A9F63", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", matchCriteriaId: "74BAC0EC-2B38-4553-A399-4BD5483C4753", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", matchCriteriaId: "4477EBA6-F0A7-452B-96E8-BA788370CCA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", matchCriteriaId: "1285D817-B5B8-4940-925D-FCDD24810AE6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", matchCriteriaId: "D289F7B4-27CD-4433-BB45-06AF98A59B7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", matchCriteriaId: "00168903-6012-4414-87D1-2EE52AA6D78E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", matchCriteriaId: "6AE8D524-577E-4994-8A4B-D15022C84D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", matchCriteriaId: "75977B0B-C44D-43BC-8D7A-AF966CDB1901", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", matchCriteriaId: "AE7F5D52-9F41-49A4-B941-E0D777203FF7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", matchCriteriaId: "52B5B3FD-5BEA-4DE8-B010-55FED1547167", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", matchCriteriaId: "167B1B04-5823-4038-A019-3975A3B447C9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", matchCriteriaId: "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", matchCriteriaId: "1BA096E0-5480-47CB-822B-D11D7E20F69F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", matchCriteriaId: "30357469-0B8F-4385-A282-2F50181EA442", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", matchCriteriaId: "3BE70772-7796-4594-880A-6AAD046E4D8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", matchCriteriaId: "1A9E2F8D-2974-4833-9EC2-233CEE257C26", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", matchCriteriaId: "17EE3078-454F-48F8-B201-3847DB40D5C4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", matchCriteriaId: "EE32C500-55C2-41A7-8621-14EBF793BF11", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", matchCriteriaId: "52D3DF52-501A-4656-98F1-8DD51D04F31F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", matchCriteriaId: "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", matchCriteriaId: "09578301-CF39-4C24-951A-535743E277EF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", matchCriteriaId: "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", matchCriteriaId: "5A65F303-96C8-4884-8D6F-F439B86BA30C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", matchCriteriaId: "1E046105-9DF5-425F-A97E-16081D54613C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", matchCriteriaId: "B2987BCF-39E6-49B6-8DEE-963A38F12B07", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", matchCriteriaId: "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", matchCriteriaId: "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", matchCriteriaId: "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", matchCriteriaId: "61D6E3CC-79B1-4995-9A76-41683C7F254A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", matchCriteriaId: "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", matchCriteriaId: "6FE5773D-3CD1-4E63-8983-E0105C46D185", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", matchCriteriaId: "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", matchCriteriaId: "18B3A53B-902C-46A5-8CE7-B55102703278", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", matchCriteriaId: "AB843479-729A-4E58-8027-0FC586F051AA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", matchCriteriaId: "1AF5A233-1E77-49FD-AC2C-60D185481E28", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", matchCriteriaId: "18519CF2-B0DA-42DD-8A3E-9084298C210A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", matchCriteriaId: "329D5FCF-7EC5-4471-906B-3619A180BD52", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", matchCriteriaId: "96CC28B6-57D1-4919-AA55-A262CC16AFE6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", matchCriteriaId: "0EB4C54D-1265-425A-B507-E1099844875A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", matchCriteriaId: "97362147-3A71-430D-9064-4435D45C3B8C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", matchCriteriaId: "89212CF3-4E99-4389-94CE-F4211DDCA01B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", matchCriteriaId: "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", matchCriteriaId: "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", matchCriteriaId: "36F027D9-DCB4-4A3D-8987-41F2941DBD45", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", matchCriteriaId: "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", matchCriteriaId: "4924CE39-A846-4DB4-9547-6322FC5AD6B3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", matchCriteriaId: "6C9E2C9A-94A1-456B-90D5-54932DF64C22", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", matchCriteriaId: "AC04C652-B2D8-4002-A50E-8AFE83204A25", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", matchCriteriaId: "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", matchCriteriaId: "754A8826-59F7-4A71-B74B-737BE9C7DE4F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", matchCriteriaId: "FADB6BDA-6825-489B-AB39-7729BA45DFD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", matchCriteriaId: "7913F57E-E600-4767-AF51-D045E1898E72", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", matchCriteriaId: "BD3783F4-5A05-45AA-9791-A681011FD78C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", matchCriteriaId: "01E3114D-31D2-4DBF-A664-F4049D8B6266", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", matchCriteriaId: "D8EE6578-981D-470C-BB24-4960B3CB1478", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", matchCriteriaId: "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", matchCriteriaId: "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", matchCriteriaId: "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", matchCriteriaId: "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", matchCriteriaId: "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", matchCriteriaId: "4417007D-126A-478B-87EA-039D088A4515", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", matchCriteriaId: "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", matchCriteriaId: "EF2FA85D-B117-410D-B247-8C5A3479319A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", matchCriteriaId: "3A041D27-132C-4B15-976F-1750C039A89F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", matchCriteriaId: "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", matchCriteriaId: "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", matchCriteriaId: "088BC395-06D5-4156-85EB-63C4A9552898", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", matchCriteriaId: "33A220A2-A6D2-46A7-B168-607400EEDCE3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", matchCriteriaId: "1E79232F-7196-440B-82D4-165885251232", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", matchCriteriaId: "ED866954-77AB-4CA8-8AED-4252C595FC4D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", matchCriteriaId: "28A1F516-B180-45D4-8EB1-754B7497CB2B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", matchCriteriaId: "36758A04-64D3-4150-A004-CF042FA31CD9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", matchCriteriaId: "1E01752E-F1DD-400A-A917-216CAF15B0F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", matchCriteriaId: "AD47EC58-F776-4F59-8F15-4B208904CF4B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", matchCriteriaId: "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", matchCriteriaId: "94565E35-8A58-4CB6-A489-C796DCB97FC5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", matchCriteriaId: "49964D35-5323-4412-BD54-661630F9A8CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", matchCriteriaId: "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", matchCriteriaId: "A0F66468-87D0-41FC-934B-5924BE2956CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", matchCriteriaId: "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", matchCriteriaId: "45C0D99E-443E-4AB1-A07A-900A09FE177E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", matchCriteriaId: "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", matchCriteriaId: "A9DAEE52-09C3-4A09-9958-9D6807B2700B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", matchCriteriaId: "B97690D4-E814-4D40-B170-BE56D7AE2C1B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", matchCriteriaId: "89804F2C-D32D-4444-ABEA-5B241153D096", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", matchCriteriaId: "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", matchCriteriaId: "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", matchCriteriaId: "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", matchCriteriaId: "7C27B318-2AC1-423D-B0C8-583BB1800D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", matchCriteriaId: "9E58E3D0-1154-4B13-BA16-67CE67DF0637", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", matchCriteriaId: "32D2ACB3-B906-4944-A021-03C4645965BD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", matchCriteriaId: "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", matchCriteriaId: "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", matchCriteriaId: "CB5BF932-459F-4DD2-B160-5FE0371C7D83", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", matchCriteriaId: "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", matchCriteriaId: "783D6EA7-C016-4314-A87B-4FED1DC7114B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", matchCriteriaId: "7AD0176F-FFAE-4A85-9327-CE72FE059E90", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", matchCriteriaId: "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", matchCriteriaId: "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", matchCriteriaId: "CB7F9D65-5537-4C25-B02B-2393F60D1299", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", matchCriteriaId: "F09C8A92-820D-4572-A797-180E17A7DEB6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", matchCriteriaId: "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", matchCriteriaId: "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", matchCriteriaId: "0C04557A-C508-4FAD-A535-1C0AEFF08075", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", matchCriteriaId: "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", matchCriteriaId: "429A99C8-BC55-4887-893C-7124C1A5DB08", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", matchCriteriaId: "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", matchCriteriaId: "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", matchCriteriaId: "6F1F1377-6220-43FB-BEF9-BAA7B0158147", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", matchCriteriaId: "18422CA8-3000-46B1-9065-2369E6B0BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", matchCriteriaId: "5D558C66-E80E-4FC7-A0DF-485466390C46", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", matchCriteriaId: "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", matchCriteriaId: "860F22F6-4C87-47C5-965E-02A1AFF41A72", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", matchCriteriaId: "19A2CA86-BFA8-4C78-987D-AD26F32622F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", matchCriteriaId: "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", matchCriteriaId: "425F6D34-EE60-464B-8EA6-8116EDAA1219", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", matchCriteriaId: "CEB9F657-1239-4424-A2E8-F8BD98C0095E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", matchCriteriaId: "F631403C-0A67-42CB-815C-133EB87E0C95", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", matchCriteriaId: "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", matchCriteriaId: "0453C0EA-BA67-49D5-964F-35493F97D905", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", matchCriteriaId: "4D4D237E-ACB7-4382-AF5B-D27E634BF867", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", matchCriteriaId: "B5461EB2-2958-4923-86AF-C74D449120B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", matchCriteriaId: "45C22141-E698-4E38-AF50-9CE04C1168FE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", matchCriteriaId: "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", matchCriteriaId: "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", matchCriteriaId: "713C4B7A-C38A-4818-A258-D07DEDEC906E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", matchCriteriaId: "C59740BE-FC30-4400-B978-1DB41282971C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", matchCriteriaId: "839728F0-5F23-462F-B493-C37EE4C874F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", matchCriteriaId: "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", matchCriteriaId: "D452F1BF-1FA5-463C-8F13-6357509FB5D1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", matchCriteriaId: "EF6D1F4C-B396-468C-BA32-9367A68C95DD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", matchCriteriaId: "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", matchCriteriaId: "6E001AAB-07EC-47BF-BDE9-BB927872781D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", matchCriteriaId: "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", matchCriteriaId: "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", matchCriteriaId: "D024802A-EA60-4D9B-B04C-027A0703EABD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", matchCriteriaId: "BA731F3C-1F04-4EE2-83EC-9486F5032903", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", matchCriteriaId: "544A59F6-E731-43C8-8455-69256933E71D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", matchCriteriaId: "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", matchCriteriaId: "69A2701A-35A8-4268-B9CF-40BA3219373B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", matchCriteriaId: "15E671F6-8DED-4735-BE97-58A60E5B5C13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", matchCriteriaId: "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", matchCriteriaId: "AAC76F31-00A5-4719-AA50-92F773919B3C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", matchCriteriaId: "49996F5A-51B2-4D4E-AE04-E98E093A76CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", matchCriteriaId: "9F8406B0-D1E5-4633-B17E-53DC99FE7622", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", matchCriteriaId: "3D49435C-7C33-454B-9F43-9C10F28A28A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", matchCriteriaId: "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", matchCriteriaId: "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", matchCriteriaId: "ED44A404-8548-4EDC-8928-4094D05A6A38", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", matchCriteriaId: "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", matchCriteriaId: "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", matchCriteriaId: "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", matchCriteriaId: "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", matchCriteriaId: "2A06696D-37F0-427D-BFC5-1606E7441C31", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", matchCriteriaId: "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", matchCriteriaId: "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", matchCriteriaId: "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", matchCriteriaId: "61309100-CFA7-4607-A236-8910838AA057", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", matchCriteriaId: "82D76265-7BD0-4C51-AE77-22B22524DE81", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", matchCriteriaId: "DE38B195-BB8D-4747-881D-E8033760B4C8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", matchCriteriaId: "1AA8BE76-168D-48A3-8DF6-E91F44600408", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", matchCriteriaId: "3B656975-5D71-4712-9820-BDB7BC248AFA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", matchCriteriaId: "FA045267-114D-4587-B6D7-E273C28DC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", matchCriteriaId: "77018415-E122-406E-896D-1BC6CF790BE3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", matchCriteriaId: "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", matchCriteriaId: "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", matchCriteriaId: "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", matchCriteriaId: "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", matchCriteriaId: "15D689D6-8594-42F2-8EEF-DCAEBA885A67", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", matchCriteriaId: "A6446000-0494-4DC5-ABAA-F20A44546068", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", matchCriteriaId: "99B94EEC-6690-45D0-B086-F4A5B25C25CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", matchCriteriaId: "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", matchCriteriaId: "832AB3CD-E3A1-4CCB-A210-287973563D0E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", matchCriteriaId: "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", matchCriteriaId: "99C4221A-9994-43B3-9C7A-E13815A50A10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", matchCriteriaId: "20070B1D-B91C-40BA-A9D8-E80170A2933F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", matchCriteriaId: "A70129C9-371F-4542-A388-C095869E593A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*", matchCriteriaId: "923D2D73-F953-44D2-9A25-E118136E8C5A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*", matchCriteriaId: "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*", matchCriteriaId: "AE2AEDB1-8C35-4210-B045-69216480B384", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*", matchCriteriaId: "484C1B49-7D90-4360-BE33-C1DAB755ED89", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*", matchCriteriaId: "C08FE92E-D97F-40E1-8482-1DA777EBC785", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*", matchCriteriaId: "2EBD6720-F788-4FD7-BC7F-AAEFAA137486", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*", matchCriteriaId: "08032549-991F-465D-8794-21C8ED2C98D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*", matchCriteriaId: "94514F41-CDCF-4EED-896E-8B5AE7360F0A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*", matchCriteriaId: "27F79141-5702-4157-8D13-FFB1C2F23FA2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*", matchCriteriaId: "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*", matchCriteriaId: "FF8D239C-B3D6-4F08-AF99-E64752B72346", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*", matchCriteriaId: "207507FE-1DC7-4569-A5A9-392290622EC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*", matchCriteriaId: "15FC32E2-9228-4903-9F0A-AF327A1C2D36", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*", matchCriteriaId: "FF50D5C4-DFC1-4306-B2C8-09D6788904FE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*", matchCriteriaId: "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*", matchCriteriaId: "62783CBF-1299-4045-A0D9-E95E7B385164", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*", matchCriteriaId: "3B04C754-50CD-4C8C-B56F-A50944EE5799", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*", matchCriteriaId: "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*", matchCriteriaId: "23BA712E-4516-4823-8E85-6AC24BE3240F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*", matchCriteriaId: "7C1303D7-33B3-48AA-BD62-74984AD22AF1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", matchCriteriaId: "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", matchCriteriaId: "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", matchCriteriaId: "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", matchCriteriaId: "1EC6ED02-134B-4322-AB72-75A0AB22701E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", matchCriteriaId: "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", matchCriteriaId: "8E1A41BA-A1D6-484A-BAD2-68DF85598354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", matchCriteriaId: "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", matchCriteriaId: "1C020F06-FD27-46E3-A48F-3F60F33BB969", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", matchCriteriaId: "03C74F10-6A7F-4F68-8A34-E981E1760DE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", matchCriteriaId: "24741B98-8D0E-4307-AAEF-A14B2531DCA9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", matchCriteriaId: "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", matchCriteriaId: "367FC8BA-F046-4264-A049-49E933E7698F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", matchCriteriaId: "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", matchCriteriaId: "C966A016-B650-44D9-B8C4-1ED50AB318DA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", matchCriteriaId: "DC448FF0-6D3F-4609-864B-4191905EE2B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", matchCriteriaId: "3FC68B2A-8570-4311-BB60-49DBBDAF7430", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", matchCriteriaId: "9826FA02-937E-4323-B9D5-8AE059ADBE95", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", matchCriteriaId: "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", matchCriteriaId: "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", matchCriteriaId: "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", matchCriteriaId: "326105AC-3926-437E-8AFF-916960107050", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", matchCriteriaId: "866E1275-7541-4B80-8FDF-53246A204C15", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", matchCriteriaId: "E190929D-D3CC-46E1-A903-0848829061DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", matchCriteriaId: "81E4EBCB-B660-4F6A-AD73-81B9D8964162", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", matchCriteriaId: "55D58CC5-CB46-464D-93B8-6AD5A19AF097", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", matchCriteriaId: "16541D3E-EBBD-4D92-96D8-F169733377AE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", matchCriteriaId: "3F08D257-F570-4D39-A6E8-0F60E55472E6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", matchCriteriaId: "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", matchCriteriaId: "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", matchCriteriaId: "233009BD-0DEC-405C-AD1A-B58AEB48B0DC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", matchCriteriaId: "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", matchCriteriaId: "A3D29927-72F4-4AF9-B096-57DB2712FBE1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", matchCriteriaId: "BA5AE231-F198-49EC-8A97-FF250A742840", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", matchCriteriaId: "22A6603F-9646-4220-BFCB-81266F1FC60E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", matchCriteriaId: "68E25472-7F96-425C-87DD-D1835B12589E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", matchCriteriaId: "09253F55-3355-44C1-862C-9A6DAD5C461C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", matchCriteriaId: "32CAE041-761F-4D81-B075-D3E567CFFE94", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", matchCriteriaId: "843E440C-3847-4B13-BB0C-E0C282853850", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", matchCriteriaId: "BEB1AF20-A65B-45F7-8C60-3475A640E2FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", matchCriteriaId: "154B92C1-04B9-459D-9FC7-6EA1E09CE12C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", matchCriteriaId: "2E0F9407-BCB5-4F50-8D54-74389DA58E15", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", matchCriteriaId: "60F6B441-537F-4255-9BC6-CE807B46DC55", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", matchCriteriaId: "CE7EFD6E-5954-4041-8245-0AB2D45E583F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*", matchCriteriaId: "8E0195D5-380D-401F-92EB-37AEA34E7478", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*", matchCriteriaId: "0E6AB8D9-FEA0-4830-941B-A2605830ADD0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", matchCriteriaId: "83A2B089-EF84-4CC6-BFF6-8E74584688CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", matchCriteriaId: "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", matchCriteriaId: "5427051C-F785-4190-86E4-7F6E226968B4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", matchCriteriaId: "B4E5D44F-183D-4B1B-8ACF-6954A834B63A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", matchCriteriaId: "96AEABB2-D597-4126-AEA2-D67117E86962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", matchCriteriaId: "1E84AC40-E06A-42B9-B125-E7263A191702", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", matchCriteriaId: "F1869D54-7B07-400D-8941-59DE0FE4127D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", matchCriteriaId: "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", matchCriteriaId: "AEC66A91-0BA2-4073-B4B7-E8354B3D2409", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", matchCriteriaId: "CAD36097-3356-49B6-93A4-B6AC9203C2A9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", matchCriteriaId: "9C0CE988-82FB-4412-AF06-91A1E056FD0B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", matchCriteriaId: "799CBCB6-5345-433A-9D2A-B36A86178982", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", matchCriteriaId: "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", matchCriteriaId: "16F2AE62-2E44-4F70-B790-1D5399DF61A7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", matchCriteriaId: "1EBF09B5-A51E-4579-A5E4-3B755CDDB737", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", matchCriteriaId: "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", matchCriteriaId: "7AC49B2C-12AB-463F-AB13-7C9A9E381014", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", matchCriteriaId: "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*", matchCriteriaId: "E40BD777-F766-4921-951C-7E38575ADA47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", matchCriteriaId: "6158ED8A-007E-48B7-99BF-8BA03BF584BD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", matchCriteriaId: "DBA7096A-F321-49A0-911A-F9683ABE6E6A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", matchCriteriaId: "6A471395-7F8F-4BA5-962D-4D8F271FAB47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", matchCriteriaId: "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", matchCriteriaId: "8010808D-805D-4CA3-9EA2-55EB1E57964C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", matchCriteriaId: "9716FE9F-A056-42A3-A241-F2FE37A6386A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", matchCriteriaId: "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", matchCriteriaId: "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", matchCriteriaId: "C5619D4D-9685-4595-8A5F-A18273FE4213", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", matchCriteriaId: "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", matchCriteriaId: "DAA3457E-7E1A-4878-9752-79382E954A66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", matchCriteriaId: "68630C63-4457-4E12-B7BD-AD456B237FC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", matchCriteriaId: "68A76015-0A05-4EC7-B136-DC13B55D881F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", matchCriteriaId: "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", matchCriteriaId: "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", matchCriteriaId: "3A649B47-E110-4C6C-AE60-13DB543CFE29", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", matchCriteriaId: "02377127-6C03-4FED-BB51-555B8E0DB223", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", matchCriteriaId: "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", matchCriteriaId: "100127DD-4981-46D3-95A7-D5C0585F097E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", matchCriteriaId: "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", matchCriteriaId: "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", matchCriteriaId: "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", matchCriteriaId: "6C4DE25F-168A-4C67-8B66-09F61F072BD4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", matchCriteriaId: "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", matchCriteriaId: "A216FA06-4E47-4105-8ADE-956F887AFC6B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", matchCriteriaId: "137DECAA-074A-4FEC-A633-FE3836E0D32B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", matchCriteriaId: "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", matchCriteriaId: "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", matchCriteriaId: "58157F24-D89E-4552-8CE6-2F01E98BD1E5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", matchCriteriaId: "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", matchCriteriaId: "328F854B-3716-47D9-BE70-765DE3689DAC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", matchCriteriaId: "D179F530-F642-444C-8184-3770FA8A338E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", matchCriteriaId: "CB237F89-7405-46F7-972E-81A3B78631BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", matchCriteriaId: "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", matchCriteriaId: "017FA232-935C-4096-8087-5F90147589C2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", matchCriteriaId: "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", matchCriteriaId: "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", matchCriteriaId: "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", matchCriteriaId: "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", matchCriteriaId: "B506523F-101E-4F05-82D5-31E37B8B2E8C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", matchCriteriaId: "1ED47811-5435-43D1-A57F-CA89807A6118", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", matchCriteriaId: "F6FB5695-2950-4CEC-81B4-FD280F835330", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", matchCriteriaId: "6799338F-C0F9-4B25-A14C-68C4158B01F6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", matchCriteriaId: "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", matchCriteriaId: "9F340AF8-508F-449D-9AFA-4E55F069B4F3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", matchCriteriaId: "E944410E-D674-4141-B50C-9F55090325FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", matchCriteriaId: "5461E4AD-2944-46A0-A696-FC32CD069D64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", matchCriteriaId: "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", matchCriteriaId: "E2A76E12-842B-4925-B5F5-53497C3E420F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", matchCriteriaId: "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", matchCriteriaId: "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", matchCriteriaId: "361C2658-F122-4AE9-B67D-4467F29E096D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", matchCriteriaId: "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", matchCriteriaId: "C47C2864-4B34-46DD-AABF-9F38B72578AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", matchCriteriaId: "77AFA400-C880-48AE-B32F-0AC8DF073CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", matchCriteriaId: "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*", matchCriteriaId: "55B1DB28-A0BE-40C5-BA4D-50354A085893", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*", matchCriteriaId: "47859796-AA68-4E49-A625-9CBB49E5967A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*", matchCriteriaId: "7FB51313-4B56-4045-A5A9-A2F2C1D21548", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*", matchCriteriaId: "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*", matchCriteriaId: "719CAF85-B1F1-4BF9-9217-6181339B20A2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*", matchCriteriaId: "F908E2B8-B4A1-487A-820D-57B1AC437754", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*", matchCriteriaId: "ACDAC96E-D749-47E0-8DE4-BA0C74027330", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*", matchCriteriaId: "461A6DF4-EC6D-4DC8-A474-B219AE372FA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*", matchCriteriaId: "60B23D94-D9F7-4EDE-9641-CE5670EB78C2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*", matchCriteriaId: "6F03C408-C457-4306-B26B-D21056B57AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*", matchCriteriaId: "2FB20448-852D-4B59-9517-DCF738140F79", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*", matchCriteriaId: "5D2A6907-9CE2-465C-89EA-F1B84B31768D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*", matchCriteriaId: "B3420C39-8177-445E-8501-49A4ED3998BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*", matchCriteriaId: "049D03CC-7D4A-4D64-A3F4-0138717433CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*", matchCriteriaId: "ACED82AA-7C7D-4089-9129-579CC6B063FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*", matchCriteriaId: "24761232-F2C3-421D-A6AB-6FC100FE9B1D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*", matchCriteriaId: "AAC00AAC-243D-437D-B613-1CF97CA58253", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*", matchCriteriaId: "832281CF-98D7-42FF-8CF1-97632F8F7834", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*", matchCriteriaId: "AE46D028-025E-4D37-9DF6-9BF385246923", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*", matchCriteriaId: "3462E847-5100-4C4E-AE79-81D2857280AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*", matchCriteriaId: "2F2D80BA-B6EE-451A-9D40-808B20E7B17A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*", matchCriteriaId: "A65D4242-CBA6-413D-846C-72772C96E14D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*", matchCriteriaId: "238B7D82-E552-46D5-9F66-1363F1610BD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*", matchCriteriaId: "6424D4A6-732D-4D4E-B099-E38FBFE1CF38", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*", matchCriteriaId: "177CA640-399E-4343-8DBB-E105E188CE3A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*", matchCriteriaId: "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*", matchCriteriaId: "8C43C5A6-31B6-4946-90DA-60BBBA03861D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*", matchCriteriaId: "CE15099D-6718-4AF8-BA3B-57DE1FE71289", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*", matchCriteriaId: "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*", matchCriteriaId: "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*", matchCriteriaId: "2B1BE9EE-4403-4983-89CD-A85C77846861", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*", matchCriteriaId: "D28279AE-D876-4692-A54B-01CCD57AB61D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*", matchCriteriaId: "E947FE61-02BA-46DB-AD95-692E33F74E6D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*", matchCriteriaId: "BD67AE51-56B8-473E-B5A3-89753D98481B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*", matchCriteriaId: "47FC1445-5032-4BF1-9A1E-AF078BAC7676", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*", matchCriteriaId: "84181B90-DEEB-4291-86F7-7C65B51FBBEE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*", matchCriteriaId: "5A72734A-69D0-4FD8-95E8-997BC06B9676", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*", matchCriteriaId: "92C1C2B4-0431-48B9-AEA9-F6925268DE92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*", matchCriteriaId: "A15B8BA9-3C75-492F-8105-C5F563653A1C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*", matchCriteriaId: "D670832E-8CB5-4861-8001-2E317CE7526C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*", matchCriteriaId: "05DEAC21-5D6B-4224-BC50-54368CD9ECA7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*", matchCriteriaId: "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*", matchCriteriaId: "6213C0D4-B0F4-4156-A467-4F29FA0E6093", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*", matchCriteriaId: "4288A260-F478-46A2-B18D-BD9CD797FE5B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*", matchCriteriaId: "159865EE-8852-4CBE-A3E3-D97C0D9CD89A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*", matchCriteriaId: "1479FE1F-882C-4EA3-A05B-B5901D14D9A5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*", matchCriteriaId: "BD701852-1959-429B-A631-2FE8390FFA31", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*", matchCriteriaId: "F687C73A-35F2-45A2-91E6-A43DCFAD463F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*", matchCriteriaId: "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*", matchCriteriaId: "02D3D433-30D2-4EBB-869A-79BB4B0AA879", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*", matchCriteriaId: "D4701873-F7AA-40B8-AFD9-4A60D118574E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", matchCriteriaId: "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", matchCriteriaId: "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", matchCriteriaId: "A0E91F46-D950-4894-BACF-05A70C7C6F7B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", matchCriteriaId: "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", matchCriteriaId: "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", matchCriteriaId: "D06639F5-5EE8-44F4-B48A-5694383154DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", matchCriteriaId: "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", matchCriteriaId: "637C3687-FBCC-41A0-BFE6-823BAE45FB92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", matchCriteriaId: "2350A197-193F-4B22-80E8-3275C97C78EE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", matchCriteriaId: "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", matchCriteriaId: "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", matchCriteriaId: "99019EA0-6576-4CE7-B60A-975D418AA917", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", matchCriteriaId: "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", matchCriteriaId: "EB9DD909-B2AC-46BA-B057-D239D0773CAD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", matchCriteriaId: "54F5C355-FDFC-4E71-93AA-218389EF10E6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", matchCriteriaId: "B0A1CA1E-971D-4F67-864E-2E772C1E736B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", matchCriteriaId: "1B5F8391-D974-49AC-8550-ADB3FA6C0535", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", matchCriteriaId: "8302BF58-9E54-40DA-BCFE-59CA52C460D9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", matchCriteriaId: "ECCDE9EF-037B-4650-8131-4D57BE141277", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", matchCriteriaId: "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", matchCriteriaId: "DB8253DA-9A04-40D6-84C1-C682B4023D4B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", matchCriteriaId: "DAF6D175-85C3-4C72-AD9F-31B47EF43154", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", matchCriteriaId: "7A5FC594-2092-4240-9538-235BBE236DD9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", matchCriteriaId: "87D95F00-EA89-4FDE-991C-56636B8E0331", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", matchCriteriaId: "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", matchCriteriaId: "4158561F-8270-42D1-91D8-E063CE7F5505", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", matchCriteriaId: "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", matchCriteriaId: "F8BACE1C-5D66-4FBC-8F86-30215A623A94", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", matchCriteriaId: "CF707146-0D64-4F3A-AE22-956EA1CB32B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", matchCriteriaId: "8118C3F9-0853-4E87-9E65-86E1398B2780", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", matchCriteriaId: "1A298501-C4D7-48D4-90F9-15AFA59DED48", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", matchCriteriaId: "FEE1B07B-3D92-4D2D-8667-D902F002277F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", matchCriteriaId: "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", matchCriteriaId: "5588732F-7F1A-4C24-B35F-30532107FFDE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", matchCriteriaId: "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", matchCriteriaId: "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", matchCriteriaId: "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", matchCriteriaId: "813965F4-3BDA-4478-8E6A-0FD52723B764", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", matchCriteriaId: "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", matchCriteriaId: "04384319-EE8C-45B4-8BDD-414502E7C02D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", matchCriteriaId: "C52528CE-4F31-4E5F-8255-E576B20F3043", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", matchCriteriaId: "A6C3F422-F865-4160-AA24-1DAFAE63729C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", matchCriteriaId: "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", matchCriteriaId: "3C18E6B4-E947-403B-80FB-7095420D482B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", matchCriteriaId: "2814CC9F-E027-4C5A-93AF-84EA445E6C12", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", matchCriteriaId: "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", matchCriteriaId: "A1236944-4942-40E4-9BA1-029FEAE94BBC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", matchCriteriaId: "086CAB4B-A10A-4165-BC33-33CADCD23C0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", matchCriteriaId: "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", matchCriteriaId: "AAFB6B30-BFB0-4397-9E16-37D1A772E639", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", matchCriteriaId: "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", matchCriteriaId: "64277594-9713-436B-8056-542CFA9F4CFC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", matchCriteriaId: "589BB170-7CBA-4F28-99E3-9242B62E2918", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", matchCriteriaId: "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", matchCriteriaId: "54464F6C-9B2D-46BA-AC44-506389F3EE0C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", matchCriteriaId: "8FA11017-EA58-45EE-8408-FCCCF7183643", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", matchCriteriaId: "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", matchCriteriaId: "442AD778-D56F-4C30-BBF8-749D6AAC4737", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", matchCriteriaId: "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", matchCriteriaId: "445BFC2E-38FA-4130-8550-0866EC4EDA33", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", matchCriteriaId: "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", matchCriteriaId: "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", matchCriteriaId: "0C8535E6-220E-4747-8992-45B6EAFC555C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", matchCriteriaId: "C7479B49-F484-4DF2-86CB-E52EE89FA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", matchCriteriaId: "B6D68512-746D-4E95-857B-13A0B6313C5E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", matchCriteriaId: "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", matchCriteriaId: "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", matchCriteriaId: "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", matchCriteriaId: "2AB02172-B9A7-4801-88F2-98BF5843184A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", matchCriteriaId: "5141380E-BD18-47C1-A84C-384BA821773D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", matchCriteriaId: "1AE6C49E-2359-4E44-9979-7D34F8460E35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", matchCriteriaId: "C004B75F-37AF-4E61-98F3-1B09A7062DDB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", matchCriteriaId: "F7126D19-C6D9-43CB-8809-647B1A20E7DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", matchCriteriaId: "9CC98503-A80A-4114-8BF2-E016659BE84E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", matchCriteriaId: "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", matchCriteriaId: "3821412D-B010-49C4-A7B4-6C5FB6C603B1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", matchCriteriaId: "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", matchCriteriaId: "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", matchCriteriaId: "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", matchCriteriaId: "F96C6CA0-434D-428F-B629-A971C2937628", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", matchCriteriaId: "301AB72A-A6F2-42C8-A931-94EF2271443F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", matchCriteriaId: "59414B5A-05B8-49AF-A197-2A31729DDB65", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", matchCriteriaId: "0BFDD380-692F-41D7-996F-F97FC74DC7CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", matchCriteriaId: "49602828-2BFC-4571-9F05-6210FD263DF2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", matchCriteriaId: "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", matchCriteriaId: "03096A9A-5758-47E6-81E2-BCFE847C41F4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", matchCriteriaId: "150CC865-7975-45EC-BFF7-A94146442BA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", matchCriteriaId: "C8FA1308-589B-432B-80F9-9A499D083ED5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", matchCriteriaId: "6ED2453E-30E1-4620-BEC5-21B0083449E2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", matchCriteriaId: "0FE8DD05-D700-4F89-9B01-D489029DF7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", matchCriteriaId: "050957CA-6191-4F9F-9D07-48B342B3B1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", matchCriteriaId: "DACBF998-8B11-45C7-9017-486AED4FAE6C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", matchCriteriaId: "C9F2F3C4-FC94-414A-A208-913A43D57D75", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", matchCriteriaId: "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", matchCriteriaId: "4911E332-B8BA-4336-A448-3F70D2BBB147", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", matchCriteriaId: "330EC403-3174-4543-9BBE-CEC0ABC1575D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", matchCriteriaId: "5EF585D0-507E-491E-9C3B-78EE26F2F070", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", matchCriteriaId: "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", matchCriteriaId: "1F5D885A-85C4-4A11-B061-61EFF6B6E329", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", matchCriteriaId: "0502B59F-933C-4E25-A2EC-9296B197E139", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", matchCriteriaId: "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", matchCriteriaId: "B5A1BAEC-18BF-4607-BFB7-48102E75186A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", matchCriteriaId: "D49ED138-F42D-4451-A350-0B2DD5AB9444", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", matchCriteriaId: "5ED91472-90FC-4AC8-96D5-1550A8502411", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", matchCriteriaId: "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", matchCriteriaId: "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", matchCriteriaId: "2784E2AF-A5E5-4960-830C-B3EFB84043D0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", matchCriteriaId: "9112FA50-5527-4B20-80F5-2DE9E66D09F6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", matchCriteriaId: "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", matchCriteriaId: "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", matchCriteriaId: "BCA05A18-1523-4EED-9D2E-0A258A33F24F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", matchCriteriaId: "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", matchCriteriaId: "78D301F1-20C2-4756-9A90-37F14835CE14", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", matchCriteriaId: "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", matchCriteriaId: "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", matchCriteriaId: "129DB9CB-E878-4856-A954-15FFE1428636", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", matchCriteriaId: "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", matchCriteriaId: "07E86978-4820-422A-8C7C-FF0697DAED05", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", matchCriteriaId: "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*", matchCriteriaId: "77447A8E-7EAA-47A2-BA7A-434F7111693B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", matchCriteriaId: "04A65469-083F-40B5-86C5-A2EAE5B2F00A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", matchCriteriaId: "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", matchCriteriaId: "B71A6DB0-5EB0-4712-8480-CF427F521D33", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", matchCriteriaId: "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", matchCriteriaId: "4DD69605-F52B-4623-921A-983A5A408ECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", matchCriteriaId: "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", matchCriteriaId: "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", matchCriteriaId: "3832D0A6-419D-4876-B5C4-920578F713F3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", matchCriteriaId: "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", matchCriteriaId: "404E38E6-9EB3-41D0-97A7-DC579688BFB0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", matchCriteriaId: "40E4A921-AB28-47B7-B5A3-EB82193D15BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", matchCriteriaId: "B0357E48-2300-47B4-B9E5-9FE813A2FC09", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", matchCriteriaId: "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", matchCriteriaId: "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", matchCriteriaId: "E0387587-AAB6-4284-8516-4DA3E3582D30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", matchCriteriaId: "A238C975-9196-449F-9C15-ABB2E9FD1D06", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", matchCriteriaId: "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", matchCriteriaId: "2537F047-64C9-4E73-B82C-310253184183", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", matchCriteriaId: "3A55857C-649D-46CE-AEDA-6E553E554FC1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", matchCriteriaId: "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", matchCriteriaId: "327E06A3-7F0E-4498-8811-10C8D15398FE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", matchCriteriaId: "1624E6D6-858E-4085-B0B9-362B819EFD88", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", matchCriteriaId: "50D61F4A-40F0-477C-8326-7359D3626E77", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", matchCriteriaId: "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", matchCriteriaId: "5B215788-860B-46CD-9A08-43AFF98FAEAA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", matchCriteriaId: "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", matchCriteriaId: "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", matchCriteriaId: "5C4815AE-B635-4545-83C2-5EC4E0128337", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", matchCriteriaId: "C0046C06-E3E6-4674-A4D1-332DD29D9552", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", matchCriteriaId: "2C191851-3DC3-41C7-AD89-81F091CCC83A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", matchCriteriaId: "21126922-8E81-47F4-82D4-CBCDDACEC4FA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", matchCriteriaId: "209E18B0-BBB5-4C65-B336-44340F7740DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", matchCriteriaId: "C867C0B8-91A4-482A-B7DD-54AB9599AE52", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", matchCriteriaId: "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", matchCriteriaId: "09854948-2657-4261-A32A-0523058F072E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", matchCriteriaId: "D13904A5-266D-481C-A42A-734C3823A238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", matchCriteriaId: "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", matchCriteriaId: "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", matchCriteriaId: "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", matchCriteriaId: "501E9355-0CDD-4951-BCC3-47962788BCCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", matchCriteriaId: "B3D976D9-62F0-43C3-8359-E51E26B6CD87", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", matchCriteriaId: "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", matchCriteriaId: "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", matchCriteriaId: "C90CCA48-1705-4564-AAF9-271201BD5113", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", matchCriteriaId: "0B82BAFF-17F5-465C-8032-67D5ECAB2921", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", matchCriteriaId: "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", matchCriteriaId: "F831371E-7437-48D7-8281-1F406215041B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", matchCriteriaId: "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", matchCriteriaId: "92AF503A-A2B1-4FC3-858B-264049ADF0F8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", matchCriteriaId: "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", matchCriteriaId: "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", matchCriteriaId: "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", matchCriteriaId: "F9849BA3-3990-4E30-B99B-ADD043314CDA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", matchCriteriaId: "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", matchCriteriaId: "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", matchCriteriaId: "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", matchCriteriaId: "D7FA2911-6561-47BF-BEE8-DDA31642C346", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", matchCriteriaId: "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", matchCriteriaId: "0F829DED-4D92-401A-BD80-C070DE57FC7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", matchCriteriaId: "F560575C-FD8E-485D-B50A-572604BBE903", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", matchCriteriaId: "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", matchCriteriaId: "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", matchCriteriaId: "381EFC43-D5D9-4D10-90BE-4C333A9BA074", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", matchCriteriaId: "CBEDED18-2755-4C55-A1A1-04B4D5F40276", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", matchCriteriaId: "F04B57EC-0731-40C8-939F-1C686A65A0FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", matchCriteriaId: "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", matchCriteriaId: "CE1D28F9-B135-441B-A9BF-792DD356E374", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", matchCriteriaId: "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", matchCriteriaId: "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", matchCriteriaId: "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", matchCriteriaId: "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", matchCriteriaId: "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", matchCriteriaId: "707F6671-57AC-4DF4-8024-444502E5C92E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", matchCriteriaId: "3C1FCE07-F9E8-4B14-95CE-01784D472128", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", matchCriteriaId: "C208711F-FC06-46C8-8849-27054DC1B264", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", matchCriteriaId: "25AB8041-F201-4BB3-AAD9-199B06697DF3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", matchCriteriaId: "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", matchCriteriaId: "1F566CD3-3649-492B-B0AB-A107E51675B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", matchCriteriaId: "BB9F3D74-AE72-4FC5-83E9-890781AF3093", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", matchCriteriaId: "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", matchCriteriaId: "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", matchCriteriaId: "C69918C6-7AAD-4AA5-AB72-C275367B1008", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", matchCriteriaId: "06155B0B-A5AD-4A82-8C02-D264981687A6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", matchCriteriaId: "F76C19A4-FA26-432A-9443-9F92B2A946EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", matchCriteriaId: "99BEE9BE-E49A-489B-B333-95D0993F8FA3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", matchCriteriaId: "7427A678-EC47-4030-B905-619DD95F5A82", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", matchCriteriaId: "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", matchCriteriaId: "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", matchCriteriaId: "A8424463-C329-4BAA-8AA1-25CD8B63292E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", matchCriteriaId: "52727E62-0048-4C56-BC8C-B3450D257B21", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", matchCriteriaId: "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", matchCriteriaId: "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", matchCriteriaId: "F6421F69-1076-43D2-B273-DE80FB2D5F72", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", matchCriteriaId: "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", matchCriteriaId: "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", matchCriteriaId: "7E611EDD-D44C-4311-B681-431D7C574528", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", matchCriteriaId: "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", matchCriteriaId: "1886D007-85B6-4E5A-968D-A1FD476A08A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", matchCriteriaId: "BDDDCB65-4404-49BC-9515-ECECD58A667F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", matchCriteriaId: "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*", matchCriteriaId: "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*", matchCriteriaId: "777E076D-285A-4CA5-8886-080BD505DB42", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*", matchCriteriaId: "4FC42173-AD0A-40F4-8ECC-17B815F047B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*", matchCriteriaId: "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*", matchCriteriaId: "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*", matchCriteriaId: "F8CE80B4-02EE-4CF5-B944-860AB16BADC6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*", matchCriteriaId: "BACC17D3-E255-4CCD-86BD-AADC9EC48E80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", matchCriteriaId: "2F9AC992-59B7-44EE-9FF3-567AC48938AA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", matchCriteriaId: "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", matchCriteriaId: "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", matchCriteriaId: "CC1BA7AC-989B-4093-841A-C6D5978BF17F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", matchCriteriaId: "1874F848-B15B-4369-A164-5FA11D2B9AFE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", matchCriteriaId: "9E46F934-9765-43ED-88A7-A4778C99A976", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", matchCriteriaId: "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", matchCriteriaId: "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", matchCriteriaId: "B206674F-1A34-470B-820C-05F9C37792CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", matchCriteriaId: "63AE2051-9F8E-4477-8E1E-38A1E06AD247", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", matchCriteriaId: "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", matchCriteriaId: "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", matchCriteriaId: "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", matchCriteriaId: "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", matchCriteriaId: "E95A34F0-0B74-4031-BC9E-CBC93665BE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", matchCriteriaId: "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", matchCriteriaId: "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", matchCriteriaId: "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", matchCriteriaId: "758E45B6-7C7A-432D-891D-CB99077AE3B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", matchCriteriaId: "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", matchCriteriaId: "26D7A401-BCE1-4673-93C9-67F009B75A39", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", matchCriteriaId: "6E62119B-2A65-4473-B570-F118614B0ED6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", matchCriteriaId: "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", matchCriteriaId: "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", matchCriteriaId: "91BE6238-312E-4CF7-9E74-48CB5603B0FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", matchCriteriaId: "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", matchCriteriaId: "33BA1BE0-0A78-4E94-A619-35735C913180", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", matchCriteriaId: "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", matchCriteriaId: "24CA40FE-80C5-4A20-8219-CEF51F3162FD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", matchCriteriaId: "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", matchCriteriaId: "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", matchCriteriaId: "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", matchCriteriaId: "8CB2949C-4699-49EF-83EB-31199E0CE2DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", matchCriteriaId: "66C169DC-EEFE-4DE6-A3D0-65B606527240", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", matchCriteriaId: "FD28227A-8888-43B2-BC41-8D54B49DA58C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", matchCriteriaId: "7984BAEA-4518-4E17-830E-B34D09648BD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", matchCriteriaId: "2C2214E5-491E-448F-A4B6-A497FB44D722", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", matchCriteriaId: "2AE93013-C262-46A5-8E77-D647881EE632", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", matchCriteriaId: "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", matchCriteriaId: "EEAC04A3-EBE3-406B-B784-A3547162ECE4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", matchCriteriaId: "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", matchCriteriaId: "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", matchCriteriaId: "5AE30903-4F75-4D71-A8BB-44D1099E9837", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", matchCriteriaId: "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", matchCriteriaId: "DB8CF348-811C-4342-ACB9-AFCABCC34331", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", matchCriteriaId: "71998EC5-EC0F-496C-B658-3CD91D824944", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", matchCriteriaId: "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", matchCriteriaId: "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", matchCriteriaId: "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", matchCriteriaId: "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", matchCriteriaId: "F699569F-4F52-4CC0-90D9-CC4CBC32428A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", matchCriteriaId: "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", matchCriteriaId: "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", matchCriteriaId: "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", matchCriteriaId: "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", matchCriteriaId: "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", matchCriteriaId: "580DF3D2-C365-43AF-9A48-F173072AA40B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", matchCriteriaId: "32AD0A43-28BF-48F4-B363-F7A3A1BFE296", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", matchCriteriaId: "9A747F9D-9761-4B8E-B01C-42018B25245A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", matchCriteriaId: "DDA4CA91-DA96-4466-8969-3570C8E4343A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", matchCriteriaId: "ECF29446-F253-438C-B1EA-B606186855FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", matchCriteriaId: "C08277EA-676A-4D45-B66D-2488308CDEEB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*", matchCriteriaId: "994C51C8-AD87-4CDB-8EBD-4488D7604BA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.", }, { lang: "es", value: "Desbordamiento de búfer en el manipulador de eventos en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x y 11.x podría permitir que un atacante provoque una denegación de servicio (DoS) mediante la misma subred.", }, ], id: "CVE-2018-3629", lastModified: "2024-11-21T04:05:48.037", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-10T21:29:00.887", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041362", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041362", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "F18CD125-5319-4955-ADEA-24073521E975", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B907926D-451E-4435-AEC2-2E5DBA695AE7", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "564A5BEF-C36A-4D8E-B458-D3083294AFCD", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "A433A19A-BBC9-4A5A-8D55-31371F91ABDA", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, { lang: "es", value: "Una lectura fuera de límites en el subsistema IPv6 en Intel® AMT e Intel® ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso de red", }, ], id: "CVE-2020-0594", lastModified: "2024-11-21T04:53:49.270", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:11.457", references: [ { source: "secure@intel.com", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", url: "https://www.kb.cert.org/vuls/id/257161", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.kb.cert.org/vuls/id/257161", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0FD2059-FA89-4010-89C3-1B5BD11E882B", versionEndExcluding: "11.8.65", versionStartIncluding: "11.8.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6A856CF2-8F1D-47C1-939A-F86919F3C2D0", versionEndExcluding: "11.11.65", versionStartIncluding: "11.11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B6C8C1CA-C2EF-485B-A711-426CFBDE5AA5", versionEndExcluding: "11.22.65", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9FED09AD-4EEE-4D93-A7EA-DC96F706814F", versionEndExcluding: "12.0.35", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.", }, { lang: "es", value: "La vulnerabilidad de escritura fuera de límites en el subsistema para Intel (R) AMT anterior a las versiones 11.8.65, 11.11.65, 11.22.65, 12.0.35 puede permitir a un usuario autenticado habilitar potencialmente la escalada de privilegios a través del acceso a la red adyacente.", }, ], id: "CVE-2019-0096", lastModified: "2024-11-21T04:16:13.373", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 5.2, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 5.1, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-17T16:29:01.283", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K84591451", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K84591451", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0FD2059-FA89-4010-89C3-1B5BD11E882B", versionEndExcluding: "11.8.65", versionStartIncluding: "11.8.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6A856CF2-8F1D-47C1-939A-F86919F3C2D0", versionEndExcluding: "11.11.65", versionStartIncluding: "11.11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B6C8C1CA-C2EF-485B-A711-426CFBDE5AA5", versionEndExcluding: "11.22.65", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9FED09AD-4EEE-4D93-A7EA-DC96F706814F", versionEndExcluding: "12.0.35", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.", }, { lang: "es", value: "Una vulnerabilidad por insuficiente validación de entrada en el subsistema para Intel (R) AMT anterior a las versiones 11.8.65, 11.11.65, 11.22.65, 12.0.35 puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios a través del acceso físico.", }, ], id: "CVE-2019-0092", lastModified: "2024-11-21T04:16:13.003", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-17T16:29:01.080", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K84591451", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K84591451", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-08-18 21:15
Modified
2024-11-21 07:03
Severity ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | standard_manageability | * | |
intel | active_management_technology_firmware | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "5FA8EEF7-DACD-45B8-92A2-CE363D4EDE23", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F802F5D5-BAF0-4246-BEAD-9227BF50EE88", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.", }, { lang: "es", value: "Unas credenciales insuficientemente protegidas para Intel(R) AMT e Intel(R) Standard Manageability pueden permitir que un usuario privilegiado permita potencialmente la divulgación de información por medio de acceso local.", }, ], id: "CVE-2022-30944", lastModified: "2024-11-21T07:03:36.327", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-08-18T21:15:08.600", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, { source: "secure@intel.com", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-522", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Severity ?
Summary
Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", versionEndIncluding: "11.20", versionStartIncluding: "6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*", matchCriteriaId: "8F249992-79C7-4005-9804-97FFFAC658E7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*", matchCriteriaId: "81C6DAFF-FD39-434C-8426-4BE5F39355EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*", matchCriteriaId: "2EE259EF-22F6-4AA1-BDF6-448E15B96F14", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*", matchCriteriaId: "EFED12C9-2563-4036-BEBC-DD9D67095917", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*", matchCriteriaId: "18155178-43F1-48A6-AC0E-9578031F7F04", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*", matchCriteriaId: "4C47688B-1D40-4D73-B363-E2E8230588FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*", matchCriteriaId: "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*", matchCriteriaId: "72BF929E-1288-448A-83A4-D26D86D26EF9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*", matchCriteriaId: "C8E4CB07-1768-4C18-ACAD-73773042C752", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*", matchCriteriaId: "31465D8E-A705-4AE3-AB2A-C296554E514C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*", matchCriteriaId: "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*", matchCriteriaId: "D8B2D356-DD32-46E0-9459-67E10AE44104", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*", matchCriteriaId: "27CDF6AC-7356-417F-84F6-33E9E3AA2082", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*", matchCriteriaId: "E8E6F0AF-78AC-4257-9164-A9A4CCA05968", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*", matchCriteriaId: "5DA61740-3E29-4820-9897-9BCB90490D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*", matchCriteriaId: "633350BA-34B4-4927-82B9-B44D1286D8FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*", matchCriteriaId: "D2E687A6-87AA-4F3A-98AB-A164EC0EE051", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*", matchCriteriaId: "53A8F993-32F4-487A-A33D-814BCDF1FAB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*", matchCriteriaId: "09EC7A10-C2AB-4DD4-9C75-073344F635E9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*", matchCriteriaId: "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*", matchCriteriaId: "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*", matchCriteriaId: "0C83B3D2-E293-4D33-AE5B-1789466696DB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*", matchCriteriaId: "CB399F3F-7C6E-463E-B822-A4365A4C290A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*", matchCriteriaId: "F5175C41-110B-4C26-80CB-C25DA11F639B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*", matchCriteriaId: "63DAF721-A7E8-4263-869D-D9E100D7C598", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*", matchCriteriaId: "F79057F7-72D3-4176-BBDD-E9A362153E66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*", matchCriteriaId: "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*", matchCriteriaId: "FD65648B-B7DB-432F-8F88-6C624F94F809", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*", matchCriteriaId: "7A949D34-E086-4821-B73A-DCCFDD6C5616", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*", matchCriteriaId: "93055544-064D-46FE-92E4-48F69DDD29B8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*", matchCriteriaId: "9A98184C-18F5-424C-BB74-9A8094B5992C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*", matchCriteriaId: "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*", matchCriteriaId: "3EB52214-6E22-49BF-B2F6-0AA282108E0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*", matchCriteriaId: "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*", matchCriteriaId: "F8E0DA72-76B5-4022-BBFA-B886F0F662CE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*", matchCriteriaId: "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*", matchCriteriaId: "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*", matchCriteriaId: "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*", matchCriteriaId: "0F67F016-A068-4079-AAE5-B247BBAE1B2A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*", matchCriteriaId: "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*", matchCriteriaId: "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*", matchCriteriaId: "DD57E072-FF46-4637-B7CF-D6C2F3BA8782", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*", matchCriteriaId: "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*", matchCriteriaId: "4B18E14C-4DC4-4AEB-8792-968D893BA402", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*", matchCriteriaId: "B706F7E4-8169-48A5-86D1-3592D3D9B845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*", matchCriteriaId: "808DAAA6-9047-49A1-BC0B-9D4725299CA2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*", matchCriteriaId: "57EFA3F2-5C76-48AF-931F-7463633370A5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*", matchCriteriaId: "A6FF59F0-9F30-448F-A109-B90FCC513CBD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*", matchCriteriaId: "07EFB7B3-772A-476D-B30F-2A442F64928F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*", matchCriteriaId: "41A69B9F-EF79-4642-A2A8-75395AD7506E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*", matchCriteriaId: "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*", matchCriteriaId: "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*", matchCriteriaId: "6C6D7877-1990-481F-9CFF-81A2BD39DA6F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*", matchCriteriaId: "6A17D56F-D53C-4198-B7EF-95BAA4711B3B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*", matchCriteriaId: "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*", matchCriteriaId: "E13892FB-C1D0-4C46-A171-9D055E58DE0B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*", matchCriteriaId: "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*", matchCriteriaId: "DB830245-29AF-4F0E-9C12-6BED7E76609D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*", matchCriteriaId: "17ACD170-347E-4DF5-AE0D-DF00854480A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*", matchCriteriaId: "3B8BCF08-D863-435F-9E70-78C7542A3C0C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*", matchCriteriaId: "9E57F037-EE11-4148-A214-0650A98A07F4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*", matchCriteriaId: "F641F2A7-64C7-43DB-862B-B7117E1B9CBC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*", matchCriteriaId: "51086E20-8A3D-4A68-8048-D385865D50FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*", matchCriteriaId: "2621BF41-EFD1-4C8A-9426-A937B68DC71E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*", matchCriteriaId: "713DC902-5264-42CB-BB22-3566A4528FED", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*", matchCriteriaId: "28554810-9989-47B2-9CF1-E421D534777E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*", matchCriteriaId: "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*", matchCriteriaId: "4DD23345-C583-4E30-A9FE-B0C485606ECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*", matchCriteriaId: "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*", matchCriteriaId: "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*", matchCriteriaId: "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*", matchCriteriaId: "E8BBEBBD-8F88-474B-A40B-7270B500AAC2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*", matchCriteriaId: "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*", matchCriteriaId: "7471E5CD-7211-474C-856F-51C199479407", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*", matchCriteriaId: "E785FA6F-A7BE-46A3-B384-029E55793DDA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*", matchCriteriaId: "2A3A4148-B91B-4799-B055-21F4A7FA74A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*", matchCriteriaId: "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*", matchCriteriaId: "353E8397-B63B-4879-9D3D-610F65929184", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*", matchCriteriaId: "D91D2C07-10D0-49F0-B353-19E34C438CEC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*", matchCriteriaId: "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*", matchCriteriaId: "F18363D9-C7D8-4C9F-9A50-33725FFE6558", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*", matchCriteriaId: "267E5275-7D50-4EF6-AB1D-7ECA894ED71B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*", matchCriteriaId: "06B91A77-76F0-41CA-B23B-69F431F0D1AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*", matchCriteriaId: "D9F01332-C259-4F3B-ABE9-C34DAC18FC18", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*", matchCriteriaId: "B9EA80D9-6A3B-42AF-B609-7429755BE504", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*", matchCriteriaId: "40B500EC-20B8-42D2-A5DF-956C96FBEB12", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*", matchCriteriaId: "D55B01E2-6783-494E-BCB9-C75D2CA042D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*", matchCriteriaId: "8D31A976-9C00-42AC-8DA1-D8B39564F456", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*", matchCriteriaId: "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*", matchCriteriaId: "A90F5756-47A1-4512-848E-3070E42506EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*", matchCriteriaId: "FDB161B7-D329-41FB-97C3-2C1EB16F74C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", versionEndIncluding: "11.20", versionStartIncluding: "6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", matchCriteriaId: "03D0265F-840B-45A1-90BD-9ED8846A9F63", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", matchCriteriaId: "74BAC0EC-2B38-4553-A399-4BD5483C4753", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", matchCriteriaId: "4477EBA6-F0A7-452B-96E8-BA788370CCA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", matchCriteriaId: "1285D817-B5B8-4940-925D-FCDD24810AE6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", matchCriteriaId: "D289F7B4-27CD-4433-BB45-06AF98A59B7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", matchCriteriaId: "00168903-6012-4414-87D1-2EE52AA6D78E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", matchCriteriaId: "6AE8D524-577E-4994-8A4B-D15022C84D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", matchCriteriaId: "75977B0B-C44D-43BC-8D7A-AF966CDB1901", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", matchCriteriaId: "AE7F5D52-9F41-49A4-B941-E0D777203FF7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", matchCriteriaId: "52B5B3FD-5BEA-4DE8-B010-55FED1547167", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", matchCriteriaId: "167B1B04-5823-4038-A019-3975A3B447C9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", matchCriteriaId: "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", matchCriteriaId: "1BA096E0-5480-47CB-822B-D11D7E20F69F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", matchCriteriaId: "30357469-0B8F-4385-A282-2F50181EA442", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", matchCriteriaId: "3BE70772-7796-4594-880A-6AAD046E4D8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", matchCriteriaId: "1A9E2F8D-2974-4833-9EC2-233CEE257C26", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", matchCriteriaId: "17EE3078-454F-48F8-B201-3847DB40D5C4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", matchCriteriaId: "EE32C500-55C2-41A7-8621-14EBF793BF11", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", matchCriteriaId: "52D3DF52-501A-4656-98F1-8DD51D04F31F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", matchCriteriaId: "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", matchCriteriaId: "09578301-CF39-4C24-951A-535743E277EF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", matchCriteriaId: "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", matchCriteriaId: "5A65F303-96C8-4884-8D6F-F439B86BA30C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", matchCriteriaId: "1E046105-9DF5-425F-A97E-16081D54613C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", matchCriteriaId: "B2987BCF-39E6-49B6-8DEE-963A38F12B07", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", matchCriteriaId: "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", matchCriteriaId: "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", matchCriteriaId: "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", matchCriteriaId: "61D6E3CC-79B1-4995-9A76-41683C7F254A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", matchCriteriaId: "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", matchCriteriaId: "6FE5773D-3CD1-4E63-8983-E0105C46D185", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", matchCriteriaId: "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", matchCriteriaId: "18B3A53B-902C-46A5-8CE7-B55102703278", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", matchCriteriaId: "AB843479-729A-4E58-8027-0FC586F051AA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", matchCriteriaId: "1AF5A233-1E77-49FD-AC2C-60D185481E28", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", matchCriteriaId: "18519CF2-B0DA-42DD-8A3E-9084298C210A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", matchCriteriaId: "329D5FCF-7EC5-4471-906B-3619A180BD52", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", matchCriteriaId: "96CC28B6-57D1-4919-AA55-A262CC16AFE6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", matchCriteriaId: "0EB4C54D-1265-425A-B507-E1099844875A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", matchCriteriaId: "97362147-3A71-430D-9064-4435D45C3B8C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", matchCriteriaId: "89212CF3-4E99-4389-94CE-F4211DDCA01B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", matchCriteriaId: "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", matchCriteriaId: "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", matchCriteriaId: "36F027D9-DCB4-4A3D-8987-41F2941DBD45", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", matchCriteriaId: "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", matchCriteriaId: "4924CE39-A846-4DB4-9547-6322FC5AD6B3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", matchCriteriaId: "6C9E2C9A-94A1-456B-90D5-54932DF64C22", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", matchCriteriaId: "AC04C652-B2D8-4002-A50E-8AFE83204A25", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", matchCriteriaId: "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", matchCriteriaId: "754A8826-59F7-4A71-B74B-737BE9C7DE4F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", matchCriteriaId: "FADB6BDA-6825-489B-AB39-7729BA45DFD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", matchCriteriaId: "7913F57E-E600-4767-AF51-D045E1898E72", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", matchCriteriaId: "BD3783F4-5A05-45AA-9791-A681011FD78C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", matchCriteriaId: "01E3114D-31D2-4DBF-A664-F4049D8B6266", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", matchCriteriaId: "D8EE6578-981D-470C-BB24-4960B3CB1478", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", matchCriteriaId: "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", matchCriteriaId: "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", matchCriteriaId: "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", matchCriteriaId: "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", matchCriteriaId: "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", matchCriteriaId: "4417007D-126A-478B-87EA-039D088A4515", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", matchCriteriaId: "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", matchCriteriaId: "EF2FA85D-B117-410D-B247-8C5A3479319A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", matchCriteriaId: "3A041D27-132C-4B15-976F-1750C039A89F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", matchCriteriaId: "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", matchCriteriaId: "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", matchCriteriaId: "088BC395-06D5-4156-85EB-63C4A9552898", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", matchCriteriaId: "33A220A2-A6D2-46A7-B168-607400EEDCE3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", matchCriteriaId: "1E79232F-7196-440B-82D4-165885251232", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", matchCriteriaId: "ED866954-77AB-4CA8-8AED-4252C595FC4D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", matchCriteriaId: "28A1F516-B180-45D4-8EB1-754B7497CB2B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", matchCriteriaId: "36758A04-64D3-4150-A004-CF042FA31CD9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", matchCriteriaId: "1E01752E-F1DD-400A-A917-216CAF15B0F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", matchCriteriaId: "AD47EC58-F776-4F59-8F15-4B208904CF4B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", matchCriteriaId: "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", matchCriteriaId: "94565E35-8A58-4CB6-A489-C796DCB97FC5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", matchCriteriaId: "49964D35-5323-4412-BD54-661630F9A8CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", matchCriteriaId: "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", matchCriteriaId: "A0F66468-87D0-41FC-934B-5924BE2956CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", matchCriteriaId: "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", matchCriteriaId: "45C0D99E-443E-4AB1-A07A-900A09FE177E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", matchCriteriaId: "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", matchCriteriaId: "A9DAEE52-09C3-4A09-9958-9D6807B2700B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", matchCriteriaId: "B97690D4-E814-4D40-B170-BE56D7AE2C1B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", matchCriteriaId: "89804F2C-D32D-4444-ABEA-5B241153D096", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", matchCriteriaId: "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", matchCriteriaId: "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", matchCriteriaId: "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", matchCriteriaId: "7C27B318-2AC1-423D-B0C8-583BB1800D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", matchCriteriaId: "9E58E3D0-1154-4B13-BA16-67CE67DF0637", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", matchCriteriaId: "32D2ACB3-B906-4944-A021-03C4645965BD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", matchCriteriaId: "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", matchCriteriaId: "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", matchCriteriaId: "CB5BF932-459F-4DD2-B160-5FE0371C7D83", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", matchCriteriaId: "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", matchCriteriaId: "783D6EA7-C016-4314-A87B-4FED1DC7114B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", matchCriteriaId: "7AD0176F-FFAE-4A85-9327-CE72FE059E90", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", matchCriteriaId: "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", matchCriteriaId: "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", matchCriteriaId: "CB7F9D65-5537-4C25-B02B-2393F60D1299", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", matchCriteriaId: "F09C8A92-820D-4572-A797-180E17A7DEB6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", matchCriteriaId: "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", matchCriteriaId: "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", matchCriteriaId: "0C04557A-C508-4FAD-A535-1C0AEFF08075", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", matchCriteriaId: "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", matchCriteriaId: "429A99C8-BC55-4887-893C-7124C1A5DB08", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", matchCriteriaId: "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", matchCriteriaId: "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", matchCriteriaId: "6F1F1377-6220-43FB-BEF9-BAA7B0158147", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", matchCriteriaId: "18422CA8-3000-46B1-9065-2369E6B0BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", matchCriteriaId: "5D558C66-E80E-4FC7-A0DF-485466390C46", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", matchCriteriaId: "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", matchCriteriaId: "860F22F6-4C87-47C5-965E-02A1AFF41A72", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", matchCriteriaId: "19A2CA86-BFA8-4C78-987D-AD26F32622F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", matchCriteriaId: "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", matchCriteriaId: "425F6D34-EE60-464B-8EA6-8116EDAA1219", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", matchCriteriaId: "CEB9F657-1239-4424-A2E8-F8BD98C0095E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", matchCriteriaId: "F631403C-0A67-42CB-815C-133EB87E0C95", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", matchCriteriaId: "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", matchCriteriaId: "0453C0EA-BA67-49D5-964F-35493F97D905", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", matchCriteriaId: "4D4D237E-ACB7-4382-AF5B-D27E634BF867", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", matchCriteriaId: "B5461EB2-2958-4923-86AF-C74D449120B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", matchCriteriaId: "45C22141-E698-4E38-AF50-9CE04C1168FE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", matchCriteriaId: "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", matchCriteriaId: "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", matchCriteriaId: "713C4B7A-C38A-4818-A258-D07DEDEC906E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", matchCriteriaId: "C59740BE-FC30-4400-B978-1DB41282971C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", matchCriteriaId: "839728F0-5F23-462F-B493-C37EE4C874F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", matchCriteriaId: "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", matchCriteriaId: "D452F1BF-1FA5-463C-8F13-6357509FB5D1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", matchCriteriaId: "EF6D1F4C-B396-468C-BA32-9367A68C95DD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", matchCriteriaId: "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", matchCriteriaId: "6E001AAB-07EC-47BF-BDE9-BB927872781D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", matchCriteriaId: "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", matchCriteriaId: "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", matchCriteriaId: "D024802A-EA60-4D9B-B04C-027A0703EABD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", matchCriteriaId: "BA731F3C-1F04-4EE2-83EC-9486F5032903", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", matchCriteriaId: "544A59F6-E731-43C8-8455-69256933E71D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", matchCriteriaId: "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", matchCriteriaId: "69A2701A-35A8-4268-B9CF-40BA3219373B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", matchCriteriaId: "15E671F6-8DED-4735-BE97-58A60E5B5C13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", versionEndIncluding: "11.20", versionStartIncluding: "6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", matchCriteriaId: "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", matchCriteriaId: "AAC76F31-00A5-4719-AA50-92F773919B3C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", matchCriteriaId: "49996F5A-51B2-4D4E-AE04-E98E093A76CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", matchCriteriaId: "9F8406B0-D1E5-4633-B17E-53DC99FE7622", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", matchCriteriaId: "3D49435C-7C33-454B-9F43-9C10F28A28A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", matchCriteriaId: "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", matchCriteriaId: "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", matchCriteriaId: "ED44A404-8548-4EDC-8928-4094D05A6A38", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", matchCriteriaId: "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", matchCriteriaId: "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", matchCriteriaId: "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", matchCriteriaId: "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", matchCriteriaId: "2A06696D-37F0-427D-BFC5-1606E7441C31", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", matchCriteriaId: "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", matchCriteriaId: "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", matchCriteriaId: "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", matchCriteriaId: "61309100-CFA7-4607-A236-8910838AA057", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", matchCriteriaId: "82D76265-7BD0-4C51-AE77-22B22524DE81", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", matchCriteriaId: "DE38B195-BB8D-4747-881D-E8033760B4C8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", matchCriteriaId: "1AA8BE76-168D-48A3-8DF6-E91F44600408", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", matchCriteriaId: "3B656975-5D71-4712-9820-BDB7BC248AFA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", matchCriteriaId: "FA045267-114D-4587-B6D7-E273C28DC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", matchCriteriaId: "77018415-E122-406E-896D-1BC6CF790BE3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", matchCriteriaId: "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", matchCriteriaId: "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", matchCriteriaId: "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", matchCriteriaId: "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", matchCriteriaId: "15D689D6-8594-42F2-8EEF-DCAEBA885A67", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", matchCriteriaId: "A6446000-0494-4DC5-ABAA-F20A44546068", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", matchCriteriaId: "99B94EEC-6690-45D0-B086-F4A5B25C25CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", matchCriteriaId: "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", matchCriteriaId: "832AB3CD-E3A1-4CCB-A210-287973563D0E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", matchCriteriaId: "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", matchCriteriaId: "99C4221A-9994-43B3-9C7A-E13815A50A10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", matchCriteriaId: "20070B1D-B91C-40BA-A9D8-E80170A2933F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", matchCriteriaId: "A70129C9-371F-4542-A388-C095869E593A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*", matchCriteriaId: "923D2D73-F953-44D2-9A25-E118136E8C5A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*", matchCriteriaId: "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*", matchCriteriaId: "AE2AEDB1-8C35-4210-B045-69216480B384", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*", matchCriteriaId: "484C1B49-7D90-4360-BE33-C1DAB755ED89", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*", matchCriteriaId: "C08FE92E-D97F-40E1-8482-1DA777EBC785", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*", matchCriteriaId: "2EBD6720-F788-4FD7-BC7F-AAEFAA137486", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*", matchCriteriaId: "08032549-991F-465D-8794-21C8ED2C98D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*", matchCriteriaId: "94514F41-CDCF-4EED-896E-8B5AE7360F0A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*", matchCriteriaId: "27F79141-5702-4157-8D13-FFB1C2F23FA2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*", matchCriteriaId: "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*", matchCriteriaId: "FF8D239C-B3D6-4F08-AF99-E64752B72346", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*", matchCriteriaId: "207507FE-1DC7-4569-A5A9-392290622EC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*", matchCriteriaId: "15FC32E2-9228-4903-9F0A-AF327A1C2D36", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*", matchCriteriaId: "FF50D5C4-DFC1-4306-B2C8-09D6788904FE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*", matchCriteriaId: "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*", matchCriteriaId: "62783CBF-1299-4045-A0D9-E95E7B385164", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*", matchCriteriaId: "3B04C754-50CD-4C8C-B56F-A50944EE5799", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*", matchCriteriaId: "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*", matchCriteriaId: "23BA712E-4516-4823-8E85-6AC24BE3240F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*", matchCriteriaId: "7C1303D7-33B3-48AA-BD62-74984AD22AF1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", versionEndIncluding: "11.20", versionStartIncluding: "6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", matchCriteriaId: "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", matchCriteriaId: "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", matchCriteriaId: "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", matchCriteriaId: "1EC6ED02-134B-4322-AB72-75A0AB22701E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", matchCriteriaId: "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", matchCriteriaId: "8E1A41BA-A1D6-484A-BAD2-68DF85598354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", matchCriteriaId: "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", matchCriteriaId: "1C020F06-FD27-46E3-A48F-3F60F33BB969", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", matchCriteriaId: "03C74F10-6A7F-4F68-8A34-E981E1760DE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", matchCriteriaId: "24741B98-8D0E-4307-AAEF-A14B2531DCA9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", matchCriteriaId: "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", matchCriteriaId: "367FC8BA-F046-4264-A049-49E933E7698F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", matchCriteriaId: "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", matchCriteriaId: "C966A016-B650-44D9-B8C4-1ED50AB318DA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", matchCriteriaId: "DC448FF0-6D3F-4609-864B-4191905EE2B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", matchCriteriaId: "3FC68B2A-8570-4311-BB60-49DBBDAF7430", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", matchCriteriaId: "9826FA02-937E-4323-B9D5-8AE059ADBE95", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", matchCriteriaId: "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", matchCriteriaId: "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", matchCriteriaId: "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", matchCriteriaId: "326105AC-3926-437E-8AFF-916960107050", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", matchCriteriaId: "866E1275-7541-4B80-8FDF-53246A204C15", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", matchCriteriaId: "E190929D-D3CC-46E1-A903-0848829061DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", matchCriteriaId: "81E4EBCB-B660-4F6A-AD73-81B9D8964162", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", matchCriteriaId: "55D58CC5-CB46-464D-93B8-6AD5A19AF097", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", matchCriteriaId: "16541D3E-EBBD-4D92-96D8-F169733377AE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", matchCriteriaId: "3F08D257-F570-4D39-A6E8-0F60E55472E6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", matchCriteriaId: "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", versionEndIncluding: "11.20", versionStartIncluding: "6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", matchCriteriaId: "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", matchCriteriaId: "233009BD-0DEC-405C-AD1A-B58AEB48B0DC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", matchCriteriaId: "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", matchCriteriaId: "A3D29927-72F4-4AF9-B096-57DB2712FBE1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", matchCriteriaId: "BA5AE231-F198-49EC-8A97-FF250A742840", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", matchCriteriaId: "22A6603F-9646-4220-BFCB-81266F1FC60E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", matchCriteriaId: "68E25472-7F96-425C-87DD-D1835B12589E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", matchCriteriaId: "09253F55-3355-44C1-862C-9A6DAD5C461C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", matchCriteriaId: "32CAE041-761F-4D81-B075-D3E567CFFE94", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", matchCriteriaId: "843E440C-3847-4B13-BB0C-E0C282853850", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", matchCriteriaId: "BEB1AF20-A65B-45F7-8C60-3475A640E2FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", matchCriteriaId: "154B92C1-04B9-459D-9FC7-6EA1E09CE12C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", matchCriteriaId: "2E0F9407-BCB5-4F50-8D54-74389DA58E15", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", matchCriteriaId: "60F6B441-537F-4255-9BC6-CE807B46DC55", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", matchCriteriaId: "CE7EFD6E-5954-4041-8245-0AB2D45E583F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*", matchCriteriaId: "8E0195D5-380D-401F-92EB-37AEA34E7478", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*", matchCriteriaId: "0E6AB8D9-FEA0-4830-941B-A2605830ADD0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", matchCriteriaId: "83A2B089-EF84-4CC6-BFF6-8E74584688CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", matchCriteriaId: "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", matchCriteriaId: "5427051C-F785-4190-86E4-7F6E226968B4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", matchCriteriaId: "B4E5D44F-183D-4B1B-8ACF-6954A834B63A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", matchCriteriaId: "96AEABB2-D597-4126-AEA2-D67117E86962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", matchCriteriaId: "1E84AC40-E06A-42B9-B125-E7263A191702", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", matchCriteriaId: "F1869D54-7B07-400D-8941-59DE0FE4127D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", matchCriteriaId: "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", matchCriteriaId: "AEC66A91-0BA2-4073-B4B7-E8354B3D2409", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", matchCriteriaId: "CAD36097-3356-49B6-93A4-B6AC9203C2A9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", matchCriteriaId: "9C0CE988-82FB-4412-AF06-91A1E056FD0B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", matchCriteriaId: "799CBCB6-5345-433A-9D2A-B36A86178982", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", matchCriteriaId: "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", matchCriteriaId: "16F2AE62-2E44-4F70-B790-1D5399DF61A7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", matchCriteriaId: "1EBF09B5-A51E-4579-A5E4-3B755CDDB737", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", matchCriteriaId: "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", matchCriteriaId: "7AC49B2C-12AB-463F-AB13-7C9A9E381014", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", matchCriteriaId: "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*", matchCriteriaId: "E40BD777-F766-4921-951C-7E38575ADA47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", matchCriteriaId: "6158ED8A-007E-48B7-99BF-8BA03BF584BD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", matchCriteriaId: "DBA7096A-F321-49A0-911A-F9683ABE6E6A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", matchCriteriaId: "6A471395-7F8F-4BA5-962D-4D8F271FAB47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", matchCriteriaId: "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", matchCriteriaId: "8010808D-805D-4CA3-9EA2-55EB1E57964C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", matchCriteriaId: "9716FE9F-A056-42A3-A241-F2FE37A6386A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", matchCriteriaId: "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", matchCriteriaId: "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", matchCriteriaId: "C5619D4D-9685-4595-8A5F-A18273FE4213", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", matchCriteriaId: "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", matchCriteriaId: "DAA3457E-7E1A-4878-9752-79382E954A66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", matchCriteriaId: "68630C63-4457-4E12-B7BD-AD456B237FC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", versionEndIncluding: "11.20", versionStartIncluding: "6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", matchCriteriaId: "68A76015-0A05-4EC7-B136-DC13B55D881F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", matchCriteriaId: "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", matchCriteriaId: "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", matchCriteriaId: "3A649B47-E110-4C6C-AE60-13DB543CFE29", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", matchCriteriaId: "02377127-6C03-4FED-BB51-555B8E0DB223", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", matchCriteriaId: "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", matchCriteriaId: "100127DD-4981-46D3-95A7-D5C0585F097E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", matchCriteriaId: "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", matchCriteriaId: "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", matchCriteriaId: "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", matchCriteriaId: "6C4DE25F-168A-4C67-8B66-09F61F072BD4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", matchCriteriaId: "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", matchCriteriaId: "A216FA06-4E47-4105-8ADE-956F887AFC6B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", matchCriteriaId: "137DECAA-074A-4FEC-A633-FE3836E0D32B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", matchCriteriaId: "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", matchCriteriaId: "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", matchCriteriaId: "58157F24-D89E-4552-8CE6-2F01E98BD1E5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", matchCriteriaId: "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", matchCriteriaId: "328F854B-3716-47D9-BE70-765DE3689DAC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", matchCriteriaId: "D179F530-F642-444C-8184-3770FA8A338E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", matchCriteriaId: "CB237F89-7405-46F7-972E-81A3B78631BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", matchCriteriaId: "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", matchCriteriaId: "017FA232-935C-4096-8087-5F90147589C2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", matchCriteriaId: "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", matchCriteriaId: "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", matchCriteriaId: "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", matchCriteriaId: "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", matchCriteriaId: "B506523F-101E-4F05-82D5-31E37B8B2E8C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", matchCriteriaId: "1ED47811-5435-43D1-A57F-CA89807A6118", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", matchCriteriaId: "F6FB5695-2950-4CEC-81B4-FD280F835330", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", matchCriteriaId: "6799338F-C0F9-4B25-A14C-68C4158B01F6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", matchCriteriaId: "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", matchCriteriaId: "9F340AF8-508F-449D-9AFA-4E55F069B4F3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", matchCriteriaId: "E944410E-D674-4141-B50C-9F55090325FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", matchCriteriaId: "5461E4AD-2944-46A0-A696-FC32CD069D64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", matchCriteriaId: "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", matchCriteriaId: "E2A76E12-842B-4925-B5F5-53497C3E420F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", matchCriteriaId: "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", matchCriteriaId: "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", matchCriteriaId: "361C2658-F122-4AE9-B67D-4467F29E096D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", matchCriteriaId: "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", matchCriteriaId: "C47C2864-4B34-46DD-AABF-9F38B72578AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", matchCriteriaId: "77AFA400-C880-48AE-B32F-0AC8DF073CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", matchCriteriaId: "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", versionEndIncluding: "11.20", versionStartIncluding: "6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*", matchCriteriaId: "55B1DB28-A0BE-40C5-BA4D-50354A085893", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*", matchCriteriaId: "47859796-AA68-4E49-A625-9CBB49E5967A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*", matchCriteriaId: "7FB51313-4B56-4045-A5A9-A2F2C1D21548", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*", matchCriteriaId: "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*", matchCriteriaId: "719CAF85-B1F1-4BF9-9217-6181339B20A2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*", matchCriteriaId: "F908E2B8-B4A1-487A-820D-57B1AC437754", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*", matchCriteriaId: "ACDAC96E-D749-47E0-8DE4-BA0C74027330", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*", matchCriteriaId: "461A6DF4-EC6D-4DC8-A474-B219AE372FA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*", matchCriteriaId: "60B23D94-D9F7-4EDE-9641-CE5670EB78C2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*", matchCriteriaId: "6F03C408-C457-4306-B26B-D21056B57AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*", matchCriteriaId: "2FB20448-852D-4B59-9517-DCF738140F79", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*", matchCriteriaId: "5D2A6907-9CE2-465C-89EA-F1B84B31768D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*", matchCriteriaId: "B3420C39-8177-445E-8501-49A4ED3998BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*", matchCriteriaId: "049D03CC-7D4A-4D64-A3F4-0138717433CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*", matchCriteriaId: "ACED82AA-7C7D-4089-9129-579CC6B063FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*", matchCriteriaId: "24761232-F2C3-421D-A6AB-6FC100FE9B1D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*", matchCriteriaId: "AAC00AAC-243D-437D-B613-1CF97CA58253", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*", matchCriteriaId: "832281CF-98D7-42FF-8CF1-97632F8F7834", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*", matchCriteriaId: "AE46D028-025E-4D37-9DF6-9BF385246923", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*", matchCriteriaId: "3462E847-5100-4C4E-AE79-81D2857280AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*", matchCriteriaId: "2F2D80BA-B6EE-451A-9D40-808B20E7B17A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*", matchCriteriaId: "A65D4242-CBA6-413D-846C-72772C96E14D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*", matchCriteriaId: "238B7D82-E552-46D5-9F66-1363F1610BD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*", matchCriteriaId: "6424D4A6-732D-4D4E-B099-E38FBFE1CF38", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*", matchCriteriaId: "177CA640-399E-4343-8DBB-E105E188CE3A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*", matchCriteriaId: "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*", matchCriteriaId: "8C43C5A6-31B6-4946-90DA-60BBBA03861D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*", matchCriteriaId: "CE15099D-6718-4AF8-BA3B-57DE1FE71289", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*", matchCriteriaId: "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*", matchCriteriaId: "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*", matchCriteriaId: "2B1BE9EE-4403-4983-89CD-A85C77846861", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*", matchCriteriaId: "D28279AE-D876-4692-A54B-01CCD57AB61D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*", matchCriteriaId: "E947FE61-02BA-46DB-AD95-692E33F74E6D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*", matchCriteriaId: "BD67AE51-56B8-473E-B5A3-89753D98481B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*", matchCriteriaId: "47FC1445-5032-4BF1-9A1E-AF078BAC7676", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*", matchCriteriaId: "84181B90-DEEB-4291-86F7-7C65B51FBBEE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*", matchCriteriaId: "5A72734A-69D0-4FD8-95E8-997BC06B9676", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*", matchCriteriaId: "92C1C2B4-0431-48B9-AEA9-F6925268DE92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*", matchCriteriaId: "A15B8BA9-3C75-492F-8105-C5F563653A1C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*", matchCriteriaId: "D670832E-8CB5-4861-8001-2E317CE7526C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*", matchCriteriaId: "05DEAC21-5D6B-4224-BC50-54368CD9ECA7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*", matchCriteriaId: "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*", matchCriteriaId: "6213C0D4-B0F4-4156-A467-4F29FA0E6093", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*", matchCriteriaId: "4288A260-F478-46A2-B18D-BD9CD797FE5B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*", matchCriteriaId: "159865EE-8852-4CBE-A3E3-D97C0D9CD89A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*", matchCriteriaId: "1479FE1F-882C-4EA3-A05B-B5901D14D9A5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*", matchCriteriaId: "BD701852-1959-429B-A631-2FE8390FFA31", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*", matchCriteriaId: "F687C73A-35F2-45A2-91E6-A43DCFAD463F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*", matchCriteriaId: "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*", matchCriteriaId: "02D3D433-30D2-4EBB-869A-79BB4B0AA879", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*", matchCriteriaId: "D4701873-F7AA-40B8-AFD9-4A60D118574E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", matchCriteriaId: "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", matchCriteriaId: "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", matchCriteriaId: "A0E91F46-D950-4894-BACF-05A70C7C6F7B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", matchCriteriaId: "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", matchCriteriaId: "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", matchCriteriaId: "D06639F5-5EE8-44F4-B48A-5694383154DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", matchCriteriaId: "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", matchCriteriaId: "637C3687-FBCC-41A0-BFE6-823BAE45FB92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", matchCriteriaId: "2350A197-193F-4B22-80E8-3275C97C78EE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", matchCriteriaId: "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", matchCriteriaId: "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", matchCriteriaId: "99019EA0-6576-4CE7-B60A-975D418AA917", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", matchCriteriaId: "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", matchCriteriaId: "EB9DD909-B2AC-46BA-B057-D239D0773CAD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", matchCriteriaId: "54F5C355-FDFC-4E71-93AA-218389EF10E6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", matchCriteriaId: "B0A1CA1E-971D-4F67-864E-2E772C1E736B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", matchCriteriaId: "1B5F8391-D974-49AC-8550-ADB3FA6C0535", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", matchCriteriaId: "8302BF58-9E54-40DA-BCFE-59CA52C460D9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", matchCriteriaId: "ECCDE9EF-037B-4650-8131-4D57BE141277", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", matchCriteriaId: "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", matchCriteriaId: "DB8253DA-9A04-40D6-84C1-C682B4023D4B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", matchCriteriaId: "DAF6D175-85C3-4C72-AD9F-31B47EF43154", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", matchCriteriaId: "7A5FC594-2092-4240-9538-235BBE236DD9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", matchCriteriaId: "87D95F00-EA89-4FDE-991C-56636B8E0331", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", matchCriteriaId: "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", matchCriteriaId: "4158561F-8270-42D1-91D8-E063CE7F5505", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", matchCriteriaId: "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", matchCriteriaId: "F8BACE1C-5D66-4FBC-8F86-30215A623A94", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", matchCriteriaId: "CF707146-0D64-4F3A-AE22-956EA1CB32B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", matchCriteriaId: "8118C3F9-0853-4E87-9E65-86E1398B2780", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", matchCriteriaId: "1A298501-C4D7-48D4-90F9-15AFA59DED48", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", matchCriteriaId: "FEE1B07B-3D92-4D2D-8667-D902F002277F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", matchCriteriaId: "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", matchCriteriaId: "5588732F-7F1A-4C24-B35F-30532107FFDE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", matchCriteriaId: "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", matchCriteriaId: "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", matchCriteriaId: "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", matchCriteriaId: "813965F4-3BDA-4478-8E6A-0FD52723B764", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", matchCriteriaId: "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", matchCriteriaId: "04384319-EE8C-45B4-8BDD-414502E7C02D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", matchCriteriaId: "C52528CE-4F31-4E5F-8255-E576B20F3043", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", matchCriteriaId: "A6C3F422-F865-4160-AA24-1DAFAE63729C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", matchCriteriaId: "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", matchCriteriaId: "3C18E6B4-E947-403B-80FB-7095420D482B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", matchCriteriaId: "2814CC9F-E027-4C5A-93AF-84EA445E6C12", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", matchCriteriaId: "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", matchCriteriaId: "A1236944-4942-40E4-9BA1-029FEAE94BBC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", matchCriteriaId: "086CAB4B-A10A-4165-BC33-33CADCD23C0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", matchCriteriaId: "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", matchCriteriaId: "AAFB6B30-BFB0-4397-9E16-37D1A772E639", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", matchCriteriaId: "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", matchCriteriaId: "64277594-9713-436B-8056-542CFA9F4CFC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", matchCriteriaId: "589BB170-7CBA-4F28-99E3-9242B62E2918", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", matchCriteriaId: "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", matchCriteriaId: "54464F6C-9B2D-46BA-AC44-506389F3EE0C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", matchCriteriaId: "8FA11017-EA58-45EE-8408-FCCCF7183643", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", matchCriteriaId: "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", matchCriteriaId: "442AD778-D56F-4C30-BBF8-749D6AAC4737", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", matchCriteriaId: "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", matchCriteriaId: "445BFC2E-38FA-4130-8550-0866EC4EDA33", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", matchCriteriaId: "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", matchCriteriaId: "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", matchCriteriaId: "0C8535E6-220E-4747-8992-45B6EAFC555C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", matchCriteriaId: "C7479B49-F484-4DF2-86CB-E52EE89FA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", matchCriteriaId: "B6D68512-746D-4E95-857B-13A0B6313C5E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", matchCriteriaId: "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", matchCriteriaId: "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", matchCriteriaId: "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", matchCriteriaId: "2AB02172-B9A7-4801-88F2-98BF5843184A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", matchCriteriaId: "5141380E-BD18-47C1-A84C-384BA821773D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", matchCriteriaId: "1AE6C49E-2359-4E44-9979-7D34F8460E35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", matchCriteriaId: "C004B75F-37AF-4E61-98F3-1B09A7062DDB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", matchCriteriaId: "F7126D19-C6D9-43CB-8809-647B1A20E7DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", matchCriteriaId: "9CC98503-A80A-4114-8BF2-E016659BE84E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", matchCriteriaId: "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", matchCriteriaId: "3821412D-B010-49C4-A7B4-6C5FB6C603B1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", matchCriteriaId: "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", matchCriteriaId: "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", matchCriteriaId: "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", matchCriteriaId: "F96C6CA0-434D-428F-B629-A971C2937628", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", matchCriteriaId: "301AB72A-A6F2-42C8-A931-94EF2271443F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", matchCriteriaId: "59414B5A-05B8-49AF-A197-2A31729DDB65", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", matchCriteriaId: "0BFDD380-692F-41D7-996F-F97FC74DC7CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", matchCriteriaId: "49602828-2BFC-4571-9F05-6210FD263DF2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", matchCriteriaId: "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", matchCriteriaId: "03096A9A-5758-47E6-81E2-BCFE847C41F4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", matchCriteriaId: "150CC865-7975-45EC-BFF7-A94146442BA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", matchCriteriaId: "C8FA1308-589B-432B-80F9-9A499D083ED5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", matchCriteriaId: "6ED2453E-30E1-4620-BEC5-21B0083449E2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", matchCriteriaId: "0FE8DD05-D700-4F89-9B01-D489029DF7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", matchCriteriaId: "050957CA-6191-4F9F-9D07-48B342B3B1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", matchCriteriaId: "DACBF998-8B11-45C7-9017-486AED4FAE6C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", matchCriteriaId: "C9F2F3C4-FC94-414A-A208-913A43D57D75", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", matchCriteriaId: "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", matchCriteriaId: "4911E332-B8BA-4336-A448-3F70D2BBB147", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", matchCriteriaId: "330EC403-3174-4543-9BBE-CEC0ABC1575D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", matchCriteriaId: "5EF585D0-507E-491E-9C3B-78EE26F2F070", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", matchCriteriaId: "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", matchCriteriaId: "1F5D885A-85C4-4A11-B061-61EFF6B6E329", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", matchCriteriaId: "0502B59F-933C-4E25-A2EC-9296B197E139", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", matchCriteriaId: "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", matchCriteriaId: "B5A1BAEC-18BF-4607-BFB7-48102E75186A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", matchCriteriaId: "D49ED138-F42D-4451-A350-0B2DD5AB9444", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", matchCriteriaId: "5ED91472-90FC-4AC8-96D5-1550A8502411", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", matchCriteriaId: "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", matchCriteriaId: "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", matchCriteriaId: "2784E2AF-A5E5-4960-830C-B3EFB84043D0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", matchCriteriaId: "9112FA50-5527-4B20-80F5-2DE9E66D09F6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", matchCriteriaId: "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", matchCriteriaId: "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", matchCriteriaId: "BCA05A18-1523-4EED-9D2E-0A258A33F24F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", matchCriteriaId: "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", matchCriteriaId: "78D301F1-20C2-4756-9A90-37F14835CE14", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", matchCriteriaId: "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", matchCriteriaId: "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", matchCriteriaId: "129DB9CB-E878-4856-A954-15FFE1428636", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", matchCriteriaId: "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", matchCriteriaId: "07E86978-4820-422A-8C7C-FF0697DAED05", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", matchCriteriaId: "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*", matchCriteriaId: "77447A8E-7EAA-47A2-BA7A-434F7111693B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", matchCriteriaId: "04A65469-083F-40B5-86C5-A2EAE5B2F00A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", matchCriteriaId: "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", matchCriteriaId: "B71A6DB0-5EB0-4712-8480-CF427F521D33", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", matchCriteriaId: "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", matchCriteriaId: "4DD69605-F52B-4623-921A-983A5A408ECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", matchCriteriaId: "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", matchCriteriaId: "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", matchCriteriaId: "3832D0A6-419D-4876-B5C4-920578F713F3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", matchCriteriaId: "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", matchCriteriaId: "404E38E6-9EB3-41D0-97A7-DC579688BFB0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", matchCriteriaId: "40E4A921-AB28-47B7-B5A3-EB82193D15BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", matchCriteriaId: "B0357E48-2300-47B4-B9E5-9FE813A2FC09", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", matchCriteriaId: "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", matchCriteriaId: "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", matchCriteriaId: "E0387587-AAB6-4284-8516-4DA3E3582D30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", matchCriteriaId: "A238C975-9196-449F-9C15-ABB2E9FD1D06", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", matchCriteriaId: "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", matchCriteriaId: "2537F047-64C9-4E73-B82C-310253184183", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", matchCriteriaId: "3A55857C-649D-46CE-AEDA-6E553E554FC1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", matchCriteriaId: "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", matchCriteriaId: "327E06A3-7F0E-4498-8811-10C8D15398FE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", matchCriteriaId: "1624E6D6-858E-4085-B0B9-362B819EFD88", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", matchCriteriaId: "50D61F4A-40F0-477C-8326-7359D3626E77", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", matchCriteriaId: "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", matchCriteriaId: "5B215788-860B-46CD-9A08-43AFF98FAEAA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", matchCriteriaId: "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", matchCriteriaId: "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", matchCriteriaId: "5C4815AE-B635-4545-83C2-5EC4E0128337", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", matchCriteriaId: "C0046C06-E3E6-4674-A4D1-332DD29D9552", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", matchCriteriaId: "2C191851-3DC3-41C7-AD89-81F091CCC83A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", matchCriteriaId: "21126922-8E81-47F4-82D4-CBCDDACEC4FA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", matchCriteriaId: "209E18B0-BBB5-4C65-B336-44340F7740DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", matchCriteriaId: "C867C0B8-91A4-482A-B7DD-54AB9599AE52", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", matchCriteriaId: "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", matchCriteriaId: "09854948-2657-4261-A32A-0523058F072E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", matchCriteriaId: "D13904A5-266D-481C-A42A-734C3823A238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", matchCriteriaId: "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", matchCriteriaId: "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", matchCriteriaId: "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", matchCriteriaId: "501E9355-0CDD-4951-BCC3-47962788BCCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", matchCriteriaId: "B3D976D9-62F0-43C3-8359-E51E26B6CD87", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", matchCriteriaId: "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", matchCriteriaId: "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", matchCriteriaId: "C90CCA48-1705-4564-AAF9-271201BD5113", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", matchCriteriaId: "0B82BAFF-17F5-465C-8032-67D5ECAB2921", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", matchCriteriaId: "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", matchCriteriaId: "F831371E-7437-48D7-8281-1F406215041B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", matchCriteriaId: "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", matchCriteriaId: "92AF503A-A2B1-4FC3-858B-264049ADF0F8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", matchCriteriaId: "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", matchCriteriaId: "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", matchCriteriaId: "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", matchCriteriaId: "F9849BA3-3990-4E30-B99B-ADD043314CDA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", matchCriteriaId: "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", matchCriteriaId: "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", matchCriteriaId: "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", matchCriteriaId: "D7FA2911-6561-47BF-BEE8-DDA31642C346", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", matchCriteriaId: "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", matchCriteriaId: "0F829DED-4D92-401A-BD80-C070DE57FC7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", matchCriteriaId: "F560575C-FD8E-485D-B50A-572604BBE903", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", matchCriteriaId: "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", matchCriteriaId: "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", matchCriteriaId: "381EFC43-D5D9-4D10-90BE-4C333A9BA074", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", matchCriteriaId: "CBEDED18-2755-4C55-A1A1-04B4D5F40276", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", matchCriteriaId: "F04B57EC-0731-40C8-939F-1C686A65A0FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", matchCriteriaId: "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", matchCriteriaId: "CE1D28F9-B135-441B-A9BF-792DD356E374", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", matchCriteriaId: "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", matchCriteriaId: "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", matchCriteriaId: "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", matchCriteriaId: "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", matchCriteriaId: "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", matchCriteriaId: "707F6671-57AC-4DF4-8024-444502E5C92E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", matchCriteriaId: "3C1FCE07-F9E8-4B14-95CE-01784D472128", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", matchCriteriaId: "C208711F-FC06-46C8-8849-27054DC1B264", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", matchCriteriaId: "25AB8041-F201-4BB3-AAD9-199B06697DF3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", matchCriteriaId: "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", matchCriteriaId: "1F566CD3-3649-492B-B0AB-A107E51675B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", matchCriteriaId: "BB9F3D74-AE72-4FC5-83E9-890781AF3093", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", matchCriteriaId: "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", matchCriteriaId: "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", matchCriteriaId: "C69918C6-7AAD-4AA5-AB72-C275367B1008", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", matchCriteriaId: "06155B0B-A5AD-4A82-8C02-D264981687A6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", matchCriteriaId: "F76C19A4-FA26-432A-9443-9F92B2A946EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", matchCriteriaId: "99BEE9BE-E49A-489B-B333-95D0993F8FA3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", matchCriteriaId: "7427A678-EC47-4030-B905-619DD95F5A82", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", matchCriteriaId: "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", matchCriteriaId: "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", matchCriteriaId: "A8424463-C329-4BAA-8AA1-25CD8B63292E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", matchCriteriaId: "52727E62-0048-4C56-BC8C-B3450D257B21", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", matchCriteriaId: "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", matchCriteriaId: "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", matchCriteriaId: "F6421F69-1076-43D2-B273-DE80FB2D5F72", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", matchCriteriaId: "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", matchCriteriaId: "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", matchCriteriaId: "7E611EDD-D44C-4311-B681-431D7C574528", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", matchCriteriaId: "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", matchCriteriaId: "1886D007-85B6-4E5A-968D-A1FD476A08A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", matchCriteriaId: "BDDDCB65-4404-49BC-9515-ECECD58A667F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", matchCriteriaId: "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*", matchCriteriaId: "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*", matchCriteriaId: "777E076D-285A-4CA5-8886-080BD505DB42", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*", matchCriteriaId: "4FC42173-AD0A-40F4-8ECC-17B815F047B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*", matchCriteriaId: "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*", matchCriteriaId: "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*", matchCriteriaId: "F8CE80B4-02EE-4CF5-B944-860AB16BADC6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*", matchCriteriaId: "BACC17D3-E255-4CCD-86BD-AADC9EC48E80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", versionEndIncluding: "11.20", versionStartIncluding: "6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", matchCriteriaId: "2F9AC992-59B7-44EE-9FF3-567AC48938AA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", matchCriteriaId: "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", matchCriteriaId: "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", matchCriteriaId: "CC1BA7AC-989B-4093-841A-C6D5978BF17F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", matchCriteriaId: "1874F848-B15B-4369-A164-5FA11D2B9AFE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", matchCriteriaId: "9E46F934-9765-43ED-88A7-A4778C99A976", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", matchCriteriaId: "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", matchCriteriaId: "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", matchCriteriaId: "B206674F-1A34-470B-820C-05F9C37792CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", matchCriteriaId: "63AE2051-9F8E-4477-8E1E-38A1E06AD247", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", matchCriteriaId: "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", matchCriteriaId: "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", matchCriteriaId: "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", matchCriteriaId: "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", matchCriteriaId: "E95A34F0-0B74-4031-BC9E-CBC93665BE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", matchCriteriaId: "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", matchCriteriaId: "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", matchCriteriaId: "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", matchCriteriaId: "758E45B6-7C7A-432D-891D-CB99077AE3B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", matchCriteriaId: "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", matchCriteriaId: "26D7A401-BCE1-4673-93C9-67F009B75A39", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", matchCriteriaId: "6E62119B-2A65-4473-B570-F118614B0ED6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", matchCriteriaId: "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", matchCriteriaId: "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", matchCriteriaId: "91BE6238-312E-4CF7-9E74-48CB5603B0FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", matchCriteriaId: "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", matchCriteriaId: "33BA1BE0-0A78-4E94-A619-35735C913180", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", matchCriteriaId: "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", matchCriteriaId: "24CA40FE-80C5-4A20-8219-CEF51F3162FD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", matchCriteriaId: "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", matchCriteriaId: "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", matchCriteriaId: "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", matchCriteriaId: "8CB2949C-4699-49EF-83EB-31199E0CE2DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", matchCriteriaId: "66C169DC-EEFE-4DE6-A3D0-65B606527240", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", matchCriteriaId: "FD28227A-8888-43B2-BC41-8D54B49DA58C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", matchCriteriaId: "7984BAEA-4518-4E17-830E-B34D09648BD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", matchCriteriaId: "2C2214E5-491E-448F-A4B6-A497FB44D722", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", matchCriteriaId: "2AE93013-C262-46A5-8E77-D647881EE632", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", matchCriteriaId: "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", matchCriteriaId: "EEAC04A3-EBE3-406B-B784-A3547162ECE4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", matchCriteriaId: "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", matchCriteriaId: "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", matchCriteriaId: "5AE30903-4F75-4D71-A8BB-44D1099E9837", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", matchCriteriaId: "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", matchCriteriaId: "DB8CF348-811C-4342-ACB9-AFCABCC34331", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", matchCriteriaId: "71998EC5-EC0F-496C-B658-3CD91D824944", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", matchCriteriaId: "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", matchCriteriaId: "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", matchCriteriaId: "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", matchCriteriaId: "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", matchCriteriaId: "F699569F-4F52-4CC0-90D9-CC4CBC32428A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", matchCriteriaId: "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", matchCriteriaId: "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", matchCriteriaId: "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", matchCriteriaId: "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", versionEndIncluding: "11.20", versionStartIncluding: "6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", matchCriteriaId: "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", matchCriteriaId: "580DF3D2-C365-43AF-9A48-F173072AA40B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", matchCriteriaId: "32AD0A43-28BF-48F4-B363-F7A3A1BFE296", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", matchCriteriaId: "9A747F9D-9761-4B8E-B01C-42018B25245A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", matchCriteriaId: "DDA4CA91-DA96-4466-8969-3570C8E4343A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", matchCriteriaId: "ECF29446-F253-438C-B1EA-B606186855FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", matchCriteriaId: "C08277EA-676A-4D45-B66D-2488308CDEEB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*", matchCriteriaId: "994C51C8-AD87-4CDB-8EBD-4488D7604BA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.", }, { lang: "es", value: "Corrupción de memoria en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 6.x, 7.x, 8.x, 9.x, 10.x, 11.0, 11.5, 11.6, 11.7, 11.10 y 11.20 podría ser provocada por un atacante con permisos de administrador locales en el sistema.", }, ], id: "CVE-2018-3632", lastModified: "2024-11-21T04:05:48.263", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-10T21:29:00.937", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041362", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041362", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | active_management_technology_firmware | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E1FE144-A9DA-406B-9BBC-BEEE40061E10", versionEndExcluding: "12.0.35", versionStartIncluding: "12.0.20", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.", }, { lang: "es", value: "Vulnerabilidad de validación de entrada insuficiente en el subsistema para Intel (R) AMT anterior a la versión 12.0.35 puede permitir a un usuario privilegiado habilitar potencialmente la denegación de servicio mediante un acceso a la red.", }, ], id: "CVE-2019-0097", lastModified: "2024-11-21T04:16:13.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-17T16:29:01.360", references: [ { source: "secure@intel.com", url: "https://support.f5.com/csp/article/K84591451", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.f5.com/csp/article/K84591451", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2025-02-05 21:15
Severity ?
7.4 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA64798E-8B8B-4C7E-9858-F753C4E3EC27", versionEndExcluding: "11.8.93", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8", versionEndExcluding: "11.12.93", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA", versionEndExcluding: "11.22.93", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4E5F9366-71AC-4F8D-9500-52A963229564", versionEndExcluding: "12.0.92", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "490C0C69-3A37-408D-B779-61EA5A2BBBC5", versionEndExcluding: "14.1.67", versionStartIncluding: "14.1", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21FAE052-A535-4BC9-8298-8C5C47650BE6", versionEndExcluding: "15.0.42", versionStartIncluding: "15.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5B456C3-213F-4396-A168-1D039DA661A5", versionEndExcluding: "16.1.25", versionStartIncluding: "16.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.", }, { lang: "es", value: "La autenticación incorrecta en el subsistema de Intel(R) AMT anterior a las versiones 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios mediante acceso local.", }, ], id: "CVE-2021-33159", lastModified: "2025-02-05T21:15:14.210", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.1, impactScore: 5.8, source: "secure@intel.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-11T16:15:11.440", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.", }, { lang: "es", value: "Una comprobación de entrada inapropiada en el subsistema para Intel® AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una denegación de servicio o una divulgación de información por medio de un acceso adyacente", }, ], id: "CVE-2020-0532", lastModified: "2024-11-21T04:53:41.160", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.8, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:10.173", references: [ { source: "secure@intel.com", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2025-02-05 21:15
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA64798E-8B8B-4C7E-9858-F753C4E3EC27", versionEndExcluding: "11.8.93", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8", versionEndExcluding: "11.12.93", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA", versionEndExcluding: "11.22.93", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4E5F9366-71AC-4F8D-9500-52A963229564", versionEndExcluding: "12.0.92", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "490C0C69-3A37-408D-B779-61EA5A2BBBC5", versionEndExcluding: "14.1.67", versionStartIncluding: "14.1", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21FAE052-A535-4BC9-8298-8C5C47650BE6", versionEndExcluding: "15.0.42", versionStartIncluding: "15.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5B456C3-213F-4396-A168-1D039DA661A5", versionEndExcluding: "16.1.25", versionStartIncluding: "16.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.", }, { lang: "es", value: "La autenticación incorrecta en el firmware de Intel(R) AMT anterior a las versiones 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso a la red.", }, ], id: "CVE-2022-29893", lastModified: "2025-02-05T21:15:17.623", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "secure@intel.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-11T16:15:14.397", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.", }, { lang: "es", value: "Un desbordamiento de enteros en el subsistema para Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local", }, ], id: "CVE-2020-8760", lastModified: "2024-11-21T05:39:23.620", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:18.207", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C23AFAB4-B286-4FD6-ABC3-86B2881E271C", versionEndExcluding: "12.0.5", versionStartIncluding: "11.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D5FAD938-027A-406F-9E7C-1BFD992839F4", versionEndExcluding: "12.0.5", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63591E72-6038-4417-BA10-54180507AF0F", versionEndExcluding: "11.0", versionStartIncluding: "9.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "503E551C-FC5F-4ABC-8DEA-E360701F0B33", versionEndExcluding: "22.01.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", matchCriteriaId: "506DEE00-30D2-4E29-9645-757EB8778C0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", versionEndExcluding: "21.01.09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", matchCriteriaId: "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B5B6E6B-16A0-4236-AABE-82385B53EC78", versionEndExcluding: "21.01.09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", matchCriteriaId: "FDF9D4C3-1892-48FA-95B4-835B636A4005", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D476D093-4A97-499C-B40D-7A301BC9AA2E", versionEndExcluding: "r1.30.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", matchCriteriaId: "F6A757F1-E478-4A3D-8D5F-C996E176A11A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D", versionEndExcluding: "r1.23.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", matchCriteriaId: "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "790D244A-AC3D-4BBC-9139-A90048FD375A", versionEndExcluding: "19.02.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", matchCriteriaId: "509AD120-3465-4C00-AAB3-B6F6ED708B51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C046182-BB33-41D0-B041-1566B8041917", versionEndExcluding: "19.01.14", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", matchCriteriaId: "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8DE74300-E061-452E-AD1D-6DD7C2C62729", versionEndExcluding: "19.02.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", matchCriteriaId: "057D9947-CE4A-4B4C-B721-4B29FB71350C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE4A7C13-6F81-4629-9C28-9202028634AE", versionEndExcluding: "19.02.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", matchCriteriaId: "E6D87239-40C1-4038-B734-D77AC4DDD571", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93485235-481B-4BAF-BB7A-81BB5AA1BC53", versionEndExcluding: "19.01.14", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", matchCriteriaId: "D8F37D88-E086-4060-8420-BD0F8D8FF580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AD949046-46E5-48C9-883B-92F04926E8BC", versionEndExcluding: "23.01.04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", matchCriteriaId: "187C6D51-5B86-484D-AE0F-26D1C9465580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.", }, { lang: "es", value: "Vulnerabilidad de canal lateral estilo Bleichenbacher en la implementación TLS en Intel Active Management Technology en versiones anteriores a la 12.0.5 podría permitir que un usuario sin autenticar obtenga la clave de sesión TLS por red.", }, ], id: "CVE-2018-3616", lastModified: "2024-11-21T04:05:46.667", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-09-12T19:29:02.403", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106996", }, { source: "secure@intel.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106996", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Severity ?
Summary
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCE880E2-5E1F-40F5-AD2F-A266A95C51B6", versionEndIncluding: "8.1.71.3608", versionStartIncluding: "8.0.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "139DA53F-A603-490F-A4E5-44D7A0071CDC", versionEndIncluding: "9.1.41.3024", versionStartIncluding: "9.0.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BFA876A3-88C1-43D8-92E0-B21E16D37736", versionEndIncluding: "10.0.55.3000", versionStartIncluding: "10.0.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.0:*:*:*:*:*:*:*", matchCriteriaId: "411DC559-E8A9-4BC4-96C6-EA753E54543E", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.5:*:*:*:*:*:*:*", matchCriteriaId: "559DF7F6-F649-4C57-893A-6775F07C31A5", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.6:*:*:*:*:*:*:*", matchCriteriaId: "2380C5D8-8A58-4279-A3D9-7234C7B1D668", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.7:*:*:*:*:*:*:*", matchCriteriaId: "39EB2D65-90F2-4866-A886-F64DB9C7D2FA", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.10:*:*:*:*:*:*:*", matchCriteriaId: "69EF0C50-F104-47CE-89E7-BC37FE1A5717", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.20:*:*:*:*:*:*:*", matchCriteriaId: "3D764C7C-2C49-4149-9586-5D0140CE00FF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2F41472A-BC3D-4226-88AC-975E523C3678", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-premium_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B0AEFB41-300D-4541-90EC-6F736A06A404", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-premium:-:*:*:*:*:*:*:*", matchCriteriaId: "54563F87-598C-4301-95C5-A582A78E3D64", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-deluxe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF442E72-096E-40C0-9258-3E2474545E2C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-deluxe:-:*:*:*:*:*:*:*", matchCriteriaId: "54781F85-88B1-488F-A33F-442947CDA125", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1EEE05D-D9C8-44C0-A8BD-D6A262A79CF0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "9606205C-88D0-44BB-8052-1E78C512DEB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EDE25BF7-37DE-4F90-81FD-D95A2A3031BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-a:-:*:*:*:*:*:*:*", matchCriteriaId: "95C71F90-C6E8-49D8-AC7E-1BC2FF49BFA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-ar_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37A4CC55-E868-4174-8FC1-23FBF75A973F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-ar:-:*:*:*:*:*:*:*", matchCriteriaId: "6C9CE58F-3A49-41B8-B9EC-F901AB83D861", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "277B4C76-D04F-467B-8367-E51F74E21ABE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-e:-:*:*:*:*:*:*:*", matchCriteriaId: "82DC9901-B4D7-4FD6-86BB-B75FF30CB11A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-k_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6701855F-2D7F-4559-A8D1-CF8A8C999B91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-k:-:*:*:*:*:*:*:*", matchCriteriaId: "E66B1596-8BAA-4805-8D49-9C42E270B219", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1F7656-9A1F-409C-BA46-BD1B979C25F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-p:-:*:*:*:*:*:*:*", matchCriteriaId: "2D7EB86B-7BC7-4D34-9EDE-04564FEFEDAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B2357072-5ED5-4DC9-BF2A-AE6F85C6C240", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "FCC3417D-44A9-489F-A440-8D3E75DD3586", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01833F6B-F38D-439A-B84A-047DBC75F71F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170m-plus\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "89756DDE-8EA9-4135-BBA8-0707FE3D81B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-p_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1249DEA2-CEF8-4009-B6BF-E0DCA5032B75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-p_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "4B7D4616-0DCA-4168-8CF4-7055AA922E2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170m-e_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57BB2B24-1B03-46DE-B4F9-CCDDD83FA28C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170m-e_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "F309D3DC-E2C2-406C-B742-71CAD9E4A568", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:sabertooth_z170_mark_1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D42A2157-8724-4CF2-88F0-048231320354", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:sabertooth_z170_mark_1:-:*:*:*:*:*:*:*", matchCriteriaId: "283B693A-D720-411C-96C9-91E356A97FD5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:sabertooth_z170_s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7868F0B3-ED86-4C00-A227-CFD8A14A0790", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:sabertooth_z170_s:-:*:*:*:*:*:*:*", matchCriteriaId: "45195F20-5E26-426A-A272-5B6342BD06C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_extreme_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A77678DA-7926-4688-BFC6-9C989985C633", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_extreme:-:*:*:*:*:*:*:*", matchCriteriaId: "7C33821F-3755-4301-B808-806F918FF06F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_ranger_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CE0AF7AF-0416-4E40-9F18-74B89E0E0F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_ranger:-:*:*:*:*:*:*:*", matchCriteriaId: "0BD49CDD-10C4-4795-BCEF-132FDB6A25CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_formula_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1763A28F-2ED5-4309-9C02-0587DD2435CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_formula:-:*:*:*:*:*:*:*", matchCriteriaId: "334D6552-C4E3-4F13-ACD1-3BE6312E9FEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_hero_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABF49D87-4566-404D-908D-3C5A02B0BE7F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_hero:-:*:*:*:*:*:*:*", matchCriteriaId: "EFCE5FB6-2F8D-4707-BE1E-26DE66C7740A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_hero_alpha_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13578BDF-A38D-4357-AD35-41BA988E286B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_hero_alpha:-:*:*:*:*:*:*:*", matchCriteriaId: "F716322D-6778-45FD-A4F0-A773A28EA3F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_gene_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D318FB-16E1-4B5D-817A-2A13DF88A1D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_gene:-:*:*:*:*:*:*:*", matchCriteriaId: "E968C4AB-61B0-435C-BAC5-A70EC78EAD5F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_impact_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "054E1398-AE98-46AB-B7A6-703F342CC847", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_impact:-:*:*:*:*:*:*:*", matchCriteriaId: "8C5667A1-AFB2-4ABF-B9C8-CB24EBFF16C4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170i_pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0BC1CDA2-B140-45FE-8FE5-2FAC5B3907E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170i_pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "9E8DCBFE-9482-40F6-9C8F-E4A472767FED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170_pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A02FA657-FC01-4795-8246-B777A7A5BCAB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170_pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "23E5CBA9-E946-4F22-A0E9-40A63380E260", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F814D5CE-2F35-4631-BC6C-857CBBD9DC72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170_pro_gaming\\/aura:-:*:*:*:*:*:*:*", matchCriteriaId: "5E3FF12D-3EA0-4738-9B36-ED5461C9D0C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150_pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3BE8D64-A47B-4412-AF8A-354D01DB719C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150_pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "F273293C-6EDA-485E-AA38-A4FE41822171", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77C23914-2AB4-4D6F-A438-F1762F235D92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150_pro_gaming\\/aura:-:*:*:*:*:*:*:*", matchCriteriaId: "22CB8991-762A-46B5-8759-AF453E21FD95", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150i_pro_gaming\\/wifi\\/aura_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3ED630E-C695-47DD-AABA-39603766CE2A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150i_pro_gaming\\/wifi\\/aura:-:*:*:*:*:*:*:*", matchCriteriaId: "6B17C450-C8E8-4255-8E23-4ABBC8664366", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150i_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C7800E86-9FAF-4D42-8029-97A22AF87E20", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150i_pro_gaming\\/aura:-:*:*:*:*:*:*:*", matchCriteriaId: "FF81798D-F241-499D-84BC-AE647D7DA06A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m_pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "552BBFAA-A268-4DF9-AC1B-9A99FD5BAA83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m_pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "CBBDF56E-375F-439E-A1A7-1D94523C6DF7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A06F70FB-E259-4957-9D86-88805F8C0753", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-a:-:*:*:*:*:*:*:*", matchCriteriaId: "91597904-8647-4109-864D-5EC577A22C55", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-a_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E32C912D-CF86-4A1B-B440-E61B3B24886C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-a_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "0232EA20-A6BB-4CC9-88FE-F91BE7EFFCFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-c_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3B8A7AC-953B-4CEE-8DF5-6B5787918CC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-c_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "B266B9C5-DB7D-41B4-BD43-F50A45B8688C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "109745AA-5210-49EE-93E2-2660FE605273", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3990C807-1EA1-42FD-9C38-7B28E99B9630", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AAFDA852-209E-49BB-9793-F2E26FAE785F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-d:-:*:*:*:*:*:*:*", matchCriteriaId: "60AB4DAC-E806-4772-96C8-F7C68930AA24", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-k_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED6011C6-C8CC-426A-BBB3-AA2698A191DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-k:-:*:*:*:*:*:*:*", matchCriteriaId: "AE6C34D6-D42F-4FA3-A9A3-985F6F49704A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "638CA839-0DB1-4F26-AC1F-3B65BB2DA0C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "75E4F53F-65C2-4254-AB16-51EB04CF10DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-f_plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F0F3C11-8700-4472-ADD5-462EAC571A5D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-f_plus:-:*:*:*:*:*:*:*", matchCriteriaId: "6381EE22-DFF3-4197-96C6-1B448D6AC9C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2BC083C-2DD2-40C5-9B5F-6CB524FD71DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "2DC8BB48-0826-45F6-B5E5-06FB66995E69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-v_plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "82068A08-B5D9-4A79-B81E-2249543175D8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-v_plus:-:*:*:*:*:*:*:*", matchCriteriaId: "723BF580-21B0-4FD4-8F43-F609AFD53B0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b150m-v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C81507B7-3C02-4AA4-B9E3-4F1DF9E9465A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b150m-v:-:*:*:*:*:*:*:*", matchCriteriaId: "A94BE221-3E91-492F-9BCB-2538B6812400", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b150m-v3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72FD9041-A1BF-4483-B9C2-70F8AB00C162", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b150m-v3:-:*:*:*:*:*:*:*", matchCriteriaId: "7A763DB3-F4AB-4696-B49B-9EC929E4B17A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b150m-v5_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30B7BF90-6D37-4211-9AC5-27F82D6DAE46", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b150m-v5:-:*:*:*:*:*:*:*", matchCriteriaId: "9D3A85B3-0576-4D31-A088-EBBEF429B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b150-v7_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8D7220B-8CF7-459E-9C93-FE2ED3AACC5B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b150-v7:-:*:*:*:*:*:*:*", matchCriteriaId: "D65B38A3-43EE-4EF8-AC46-8725EB3B4E69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23C4E73F-2B93-4CAE-ABDB-AF1C6C3E1763", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "42F37D51-6D2D-4325-BB0D-3FE2D5D1F2C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BBF463BA-68F0-46C5-A948-EA233A7B493E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-a\\/m.2:-:*:*:*:*:*:*:*", matchCriteriaId: "10021E63-ED8B-4C5D-9559-93DA26469611", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B91F6BEA-C713-4394-A894-AC40053E4FD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-c:-:*:*:*:*:*:*:*", matchCriteriaId: "3202BBE4-8BC9-4266-89E1-02EC58034284", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-c\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "09432C60-8EC9-4FF9-9633-FF8779A5F9B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-c\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "49991ED2-1D79-4148-8F05-DE224ADC5181", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:pio-b150m_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30643353-C9AC-494F-B34D-4226042910CF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:pio-b150m:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B96870-A832-46FF-AF3F-169C486464B4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:trooper_b150_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "820B589F-9D3E-4D9C-8112-C11E28F9271E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:trooper_b150_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "8645FCEC-625F-4540-843D-CB56FBFABDBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-plus_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BBF89B32-1A7C-4BDA-9A45-1FFC1F38DE29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-plus_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "0EE36CBA-3C04-463E-A21A-1F489D755896", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150_pro_gaming_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6625FD9F-41FA-450E-9CD0-AC8C237C4D4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150_pro_gaming_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "21888815-D392-4E6D-A831-F2C170E4BE8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-k_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27B7FD9B-4FD1-4B60-8394-F51A8446D901", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-k_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "72749164-D3A3-4F10-80FC-331FB6705899", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150-pro_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC24FA1-BB23-4FB3-A35B-6BD05BA45EC9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150-pro_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "8CFFAE60-468F-4861-AED3-76EAF9676E19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-h110m-v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8ADE34C-4A5E-49CA-83CB-119703C5C2B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-h110m-v:-:*:*:*:*:*:*:*", matchCriteriaId: "3DFC293D-73DA-4048-A89D-92092D7BE42E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-h110m-v3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C5847BEF-CD8B-4B2C-A015-847CE9611EB0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-h110m-v3:-:*:*:*:*:*:*:*", matchCriteriaId: "AF1D362C-359D-455E-BBEF-9B77838419B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110i-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "16B21217-FC88-4AA0-A4AA-49E98A30122C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110i-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "E18DCD2A-3F80-461A-A04D-7BF084438E07", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-a\\/dp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2A70E8F-6058-4776-85D7-7FBA0D6B33B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-a\\/dp:-:*:*:*:*:*:*:*", matchCriteriaId: "14544DF1-2E6E-4A8B-9B86-2E10B5FE4282", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9229F19B-E8A3-44A0-862C-BE7DE7264018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c:-:*:*:*:*:*:*:*", matchCriteriaId: "49098E76-F811-451A-8D7F-1B40491A2278", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE58681-7681-4729-A9AC-FB1317FE1168", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "59B400E0-1526-4C46-A60D-84D468B1911E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c\\/hdmi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1204092-3B5B-4243-A0F6-B16C5C661F77", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c\\/hdmi:-:*:*:*:*:*:*:*", matchCriteriaId: "E71E3A13-644B-491C-97AA-688DA9214561", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c\\/ps_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6F8AD0F1-8E0E-46C2-9F32-F34F16CFE491", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c\\/ps:-:*:*:*:*:*:*:*", matchCriteriaId: "38472135-237B-4EE1-8D66-D94B6F3FCFD4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33F4CBF7-CBA2-438A-A997-ACDB83322F2C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c2:-:*:*:*:*:*:*:*", matchCriteriaId: "767EE0C3-16EC-4D40-A86D-B14586EF9AD5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c2\\/tf_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2B122984-8F1E-4CBE-A127-2C7AA5BE1178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c2\\/tf:-:*:*:*:*:*:*:*", matchCriteriaId: "AE17F92F-990E-4080-BEE0-9549FBDAAE0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-cs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13D9955B-57E0-404B-B677-0F0CBAB17606", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-cs:-:*:*:*:*:*:*:*", matchCriteriaId: "A1D30CDF-60B0-40B6-8F3E-4C68AD2F507C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-cs_x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61CFCE10-117B-4596-9EC8-0FD763D83445", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-cs_x:-:*:*:*:*:*:*:*", matchCriteriaId: "801129A7-C8A2-4D90-9C54-13FAC9B96762", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-cs\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7E870D6C-4C0F-4C70-A432-FD02CE45AEA6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-cs\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "AA55C126-A4D3-48D5-A277-772923EAA7DA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-d\\/exper\\/si_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "927D8CBD-EF57-48E2-A80C-E27907E72CED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-d\\/exper\\/si:-:*:*:*:*:*:*:*", matchCriteriaId: "1D6DF281-4E33-4DE5-B5F5-9FEA95885ADF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-k_x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "62A74624-952E-4342-BABF-9E59DE71A633", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-k_x:-:*:*:*:*:*:*:*", matchCriteriaId: "D1CC4DAA-79B1-4747-BE1E-69C194E6BCDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-ks_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F8B2CA4-B41E-4900-8F85-80A472670868", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-ks:-:*:*:*:*:*:*:*", matchCriteriaId: "FE12AD23-6AC5-4F08-B1B1-E59F728E9668", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-ks_r1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98B532EC-7D68-4F05-9C84-EB074A85A764", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-ks_r1:-:*:*:*:*:*:*:*", matchCriteriaId: "B97E501F-0C7F-4BA0-B04C-C8A623F7156F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-p\\/dvi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "75E4DEB7-3F0F-4C62-991B-5A75B27696AA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-p\\/dvi:-:*:*:*:*:*:*:*", matchCriteriaId: "F9810952-332C-4849-BB12-1253AF76E1BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-ts_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E3779667-7513-44D8-B2E5-1925594AD3E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-ts:-:*:*:*:*:*:*:*", matchCriteriaId: "C795E996-2996-4731-A78E-FFA9585DCD31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2058E0D4-EAEB-4CD1-AD89-BC69858B734A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "558AF38E-674A-49B5-A023-2043C89714E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110s1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E5E83F44-B421-4B24-BE8D-561D57883E54", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110s1:-:*:*:*:*:*:*:*", matchCriteriaId: "38AAA664-8BC3-413F-BB92-8BB6B3690EDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110s2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42CB2BDF-E9BF-4049-8D44-FD660AC60AAF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110s2:-:*:*:*:*:*:*:*", matchCriteriaId: "81F53F8B-379A-416E-A44D-38ED9499A120", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C47313A-2FBA-49AD-AD68-5F817411D994", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110t:-:*:*:*:*:*:*:*", matchCriteriaId: "A0232650-B917-4734-B322-D12ADB06B435", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110t-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48BC9BDF-0562-44FE-B2A5-F8B26B98D94D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "70A3F2A5-56BF-41E8-959B-0AFFCC130361", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B4A88EE-9112-40B0-8A11-4841550B5C3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-a\\/m.2:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A4787E-F9CA-45F2-B43A-3C9BAD580204", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D757A98E-209C-4391-9B7B-2CD60D5A4FB8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-d:-:*:*:*:*:*:*:*", matchCriteriaId: "A12979DE-AEC4-4D51-8E0A-E714C85F6D7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8FC08CFA-0254-41A0-8599-7F1033782B2A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-e:-:*:*:*:*:*:*:*", matchCriteriaId: "6367721C-A009-45AC-B272-8290A8331284", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-e\\/m.2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9617970B-9C4B-47D3-982D-8200BC52D0E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-e\\/m.2:-:*:*:*:*:*:*:*", matchCriteriaId: "2E1915CF-2419-4C1B-80B9-8D29D379E1FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "179BC9DB-AA35-4A54-8EB3-1DB295727997", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-f:-:*:*:*:*:*:*:*", matchCriteriaId: "D1B8722E-E334-47F3-A3BE-B9AB798A5305", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-k_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0E65AAA6-B29F-4859-9A99-591F6BD1371C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-k:-:*:*:*:*:*:*:*", matchCriteriaId: "D182935F-8629-4F9D-925D-A166007B446B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B54A67BA-C862-4BA0-94D2-13362FF2F26B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-a:-:*:*:*:*:*:*:*", matchCriteriaId: "975830EE-92F4-4614-9AE8-E9D5DBADE414", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:trooper_h110_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D12B0228-80F1-466D-86F2-57F7E7BA4095", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:trooper_h110_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "6B75FEA3-D643-4348-9FA8-07D3127C8D88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C6C8818-47EC-47B5-980F-5109C56C5C1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "85E4C230-C8B3-496E-9012-5CF032D420E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-r_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7952968-C3A8-40CA-8000-74B23C112AB0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-r:-:*:*:*:*:*:*:*", matchCriteriaId: "1C05633B-3CD2-429B-9239-DB6F189C8C79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h110m2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "87D53057-61DA-498B-B76D-6FB0FD50BF61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h110m2:-:*:*:*:*:*:*:*", matchCriteriaId: "4E222A3E-2E1E-4B46-A6DC-E91831CEA856", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h110m2\\/fpt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C7A40AA-4A94-4DB5-ACE5-048E7E1C998D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h110m2\\/fpt:-:*:*:*:*:*:*:*", matchCriteriaId: "D149B106-67CF-49A1-AE7D-CE3F3BC3F266", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h110m-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FC93A9D-E01B-40CD-95C8-A82085358E16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h110m-p:-:*:*:*:*:*:*:*", matchCriteriaId: "3E3D7210-68E7-4D3D-B65A-F7C200C07A95", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-k_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22F82466-28C5-4495-876C-4697AC0834E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-k_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "99B2BCE6-8BA3-4A11-B030-F571346AB3B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-a_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "137F1817-ED86-4371-8553-70D415802E23", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-a_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "EB077E96-C7D6-4314-92B3-52ED4B6C10BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CF58ED92-6E4B-4130-BAB0-81DA31518E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "B037D858-125F-4762-8DA2-09BA7807898D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170i-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5BC8AEFC-6BF0-497B-8BAF-7DA3EFB8FBD2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170i-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "1297573C-0F72-477A-B85C-0ED65412E893", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170_pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CEFFDE24-215A-43B8-9B3F-D73B52ECFD15", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170_pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "BED2A131-07A0-4E8B-8015-9E55DC1C6BF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "513A1D93-DE0D-4455-95C8-FC7AF72677D2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "59B4013A-5F8E-47AD-80D5-526A68281515", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170-pro\\/usb_3.1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "982E919B-4936-4BE3-955C-82FFEE504807", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170-pro\\/usb_3.1:-:*:*:*:*:*:*:*", matchCriteriaId: "7F7415EB-47BE-4F88-8310-9BB1CF0EF299", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04DD6014-6CF9-45AC-8A2E-0AD946B811C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170m-plus\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "7FE848FF-BB23-4D4F-AFFF-45EC87315A67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170-plus_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "756F0FED-9E9B-4540-A425-F7534C4BE070", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170-plus_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "918AB13E-43F3-47F2-98FA-56FE89CFB1FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170m-e_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2C797373-3D39-45AC-BF51-4D0FF6471D83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170m-e_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "8B7EC3FF-81AF-40F4-98D0-4A1DFB937222", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b250-v7_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3D72C50-E023-44FE-B44A-EBB96883F234", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b250-v7:-:*:*:*:*:*:*:*", matchCriteriaId: "895AA24B-1419-4E66-8BE1-7D3439496FCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b250_mining_expert_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5BF02AB1-1C94-48A1-BCBD-A50F049DCA97", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b250_mining_expert:-:*:*:*:*:*:*:*", matchCriteriaId: "79A2E62F-94DC-4F76-BFB5-96B45E8E3364", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4BFF834F-54FD-4427-86BC-59CACB5720EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-d:-:*:*:*:*:*:*:*", matchCriteriaId: "FFFE0FB6-3E57-420E-BAFD-89C67EC8798C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9FC5BA59-2868-4066-B557-A337FCBEBAEE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250-a:-:*:*:*:*:*:*:*", matchCriteriaId: "9D54BCF0-396D-4AE9-BF98-408A30C23DFA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "712F55B3-C78D-4BB1-AC61-C6789997F830", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-a:-:*:*:*:*:*:*:*", matchCriteriaId: "2EE19287-8C71-4161-94C5-B31A2CA907FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-j_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AD1F89C-B419-43B7-8CEC-BBA00C0A33B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-j:-:*:*:*:*:*:*:*", matchCriteriaId: "E868B563-75A7-4E94-875F-BC0EA7AA228A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DA489C-E6A4-4F30-9CBF-D532D4DC4934", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "1E0A4463-96F7-4516-B91C-DFAFA98358D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42625B8C-5163-43B9-9DC8-E8AB1E1A6CF3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "6721CA1E-EEAC-4CF0-BB0C-4AE44049CDC6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-k_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB59C47E-47B5-41C4-A142-E818589D86A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-k:-:*:*:*:*:*:*:*", matchCriteriaId: "4512943B-7794-454B-A0AD-D1F7C23D00BB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9FB07DCB-5D90-4BDA-8277-99211DBB3BF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "9A4EC730-8E50-4274-99F8-B6A57C843546", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_b250i_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C4A7BB6-6E6D-48BD-9539-E01C801E2CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_b250i_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "89865346-0EC6-4C1C-92CC-231ECE6AF73F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_b250g_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F70AAD95-7460-49EE-BA18-4A9826658CDA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_b250g_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "2C326D51-0C5D-48CE-AF7B-73DF1BD08F67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_b250h_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "900ECAD1-0290-490E-BB94-82667C13B829", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_b250h_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "0760F2E1-5A01-40FC-9A2A-05C769D05986", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_b250f_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "20419867-19A3-41D0-AD4E-866B47035EF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_b250f_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "97D572B8-0F2C-48A9-B397-DA1FE92844B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b250m-c_pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E49CE82-A630-4BBA-AE5B-35E1D7FF299B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b250m-c_pro:-:*:*:*:*:*:*:*", matchCriteriaId: "CBE24086-8BC1-4B7C-BB2A-D4623A2841C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b250m-f_plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9941B2B-CE46-4669-947D-2BA09DEF6B1A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b250m-f_plus:-:*:*:*:*:*:*:*", matchCriteriaId: "CE77E05B-54E7-4691-AF93-ADC24AE07D9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b250-mr_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34DA5C31-71E8-4CEF-AEFD-0BD468E98870", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b250-mr:-:*:*:*:*:*:*:*", matchCriteriaId: "118522B5-3E87-4D27-9FC3-13F3AE4651BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b250-s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6C02BD4-E46B-467A-8441-633933EE57E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b250-s:-:*:*:*:*:*:*:*", matchCriteriaId: "A270BEB2-4073-457B-9E7A-041F25B00A70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b250m-v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4494A410-658A-4DC7-85C6-3792D4A4636D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b250m-v:-:*:*:*:*:*:*:*", matchCriteriaId: "2D5BAFA0-2A5C-47A4-BA7F-B5C6A0436A5F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b250m-v3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6928685-947A-444F-B242-55B30F2BD495", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b250m-v3:-:*:*:*:*:*:*:*", matchCriteriaId: "0170DE0A-DF4E-4881-9C66-9BF005897F12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b250m-v5_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F713C93B-03CC-4688-8590-81C84C52D10F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b250m-v5:-:*:*:*:*:*:*:*", matchCriteriaId: "A1D5135C-B68A-4D60-89A7-AA3FF6DC8508", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:pio-b250i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8F194921-25DA-40AD-AC77-A5C886E653DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:pio-b250i:-:*:*:*:*:*:*:*", matchCriteriaId: "16DB8D6C-64B9-4F5C-AFBB-EF32A2EF1949", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5B3E1D43-964F-4AC3-B0AA-E7D30F2135B7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-c:-:*:*:*:*:*:*:*", matchCriteriaId: "2E50A677-E925-4E60-8F81-FB8E4A8CCBF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-plus\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD09D5B3-575A-4941-99DF-C1CCB324EF0D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-plus\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "70A7A86F-A63B-4F2C-AE2C-7F321CA7E017", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h270-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "894292B4-B683-4AE1-ACA0-07E14A7CAB04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h270-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "78B312D0-771C-4C55-92E7-E19A82201B94", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h270-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1A889C5B-AA38-4BEC-B9D9-C20BCD51ED34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h270-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "0E8466D0-3102-4301-8F34-69FDF5E2F760", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_h270i_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C297BE7C-ED2C-4E7C-888D-78C9246D3F4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_h270i_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "D92BB8F1-1C5D-4DDE-8A35-CFC96EEE2A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_h270f_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "76DB8A91-69F2-4028-AC04-B0FFCCFDD882", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_h270f_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "C85379BD-1976-43A2-87D0-B690B4A9440F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h270m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "369BF713-2229-493B-902C-D23F3DFE504A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h270m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "6DB699E7-4212-46C0-BBA0-A3A08AD6C225", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_ix_extreme_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C399C14-6B6D-4CFC-AB98-94FCA8B982EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_ix_extreme:-:*:*:*:*:*:*:*", matchCriteriaId: "A32D2A1B-DA72-4FF2-A1FD-804B1A3671B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_ix_formula_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "072786FB-D929-48A9-BBB7-7EC3899DC9A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_ix_formula:-:*:*:*:*:*:*:*", matchCriteriaId: "DCA041A0-8103-4742-BA97-FD28DD2EDEE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_ix_code_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "86C5F146-C7FD-4479-8E11-7443DCEA38ED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_ix_code:-:*:*:*:*:*:*:*", matchCriteriaId: "5FA3A7B7-27CF-467A-B387-1B5D6120C0B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_ix_apex_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CBCB7188-8D72-4619-9779-73B6586A18E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_ix_apex:-:*:*:*:*:*:*:*", matchCriteriaId: "92B48FFA-7FFE-44AB-9528-0681F631C1FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_ix_hero_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D402D3D7-319F-45D7-A5A2-8D1972D92F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_ix_hero:-:*:*:*:*:*:*:*", matchCriteriaId: "49D75118-242F-454C-97B6-9C50330E82BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "20F905D6-74DD-4547-82CF-AB43E3DD5AA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270-a:-:*:*:*:*:*:*:*", matchCriteriaId: "D84124C1-41B9-4963-9E2E-F84E356D2EC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270-ar_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60D56403-47C2-4321-BEB9-E08D392AE2CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270-ar:-:*:*:*:*:*:*:*", matchCriteriaId: "A522350E-2FCE-4DFA-A660-7FA0CD1462C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270e_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED821805-43F4-4594-8B34-9369A4A51919", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270e_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "6E59CD1D-24F8-40DD-BC34-1798B9BFD142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270f_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "47B55966-2BE6-43B7-B3B1-5AC2E476029D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270f_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "F80FE467-6745-462E-9602-D99EEFE4496F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270g_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1D51FA0-90A9-479D-9F0A-D0A8BFC5C6E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270g_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "E5D0B584-4C98-4C58-B098-153A07FA7B7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270h_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77D33D60-DE04-4189-A8E6-B453F566970A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270h_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "122BD789-E195-48C4-8043-E7C911809AF6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:tuf_z270_mark_1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F5C6507-2A00-4BEE-A2B0-9D0099DF4EC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:tuf_z270_mark_1:-:*:*:*:*:*:*:*", matchCriteriaId: "52653418-2D8C-464A-806A-0E5BB7C70C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:tuf_z270_mark_2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4AB056A-3C43-4C1A-8ECB-C8ACF645FFB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:tuf_z270_mark_2:-:*:*:*:*:*:*:*", matchCriteriaId: "098C6278-2B15-4D35-BDAD-6EABB5DE4A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270h_gaming\\/k1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE33B2CC-C64B-4983-928A-BE8332458922", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270h_gaming\\/k1:-:*:*:*:*:*:*:*", matchCriteriaId: "57DD3BFB-3AC5-43E8-AF3D-AA9DDC0E0B68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270-k_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63602AEB-A984-4556-B7B4-906BF0B1C4CB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270-k:-:*:*:*:*:*:*:*", matchCriteriaId: "69CACC60-EF0C-417B-8927-CBFDB90DE31D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D434C2FA-C27E-477F-A82E-4DB6B29F3162", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270-p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CBCF0D7-EACE-4368-AE89-F4B70BD583F8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270i_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB7FA773-033A-4502-A675-25AA640A9C61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270i_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "3CD3456D-04D8-4269-9971-D9245185FB63", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4AE1333-6F84-4D66-B5D0-C4FE8A3360A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "801BA881-11C2-4042-87A1-6FDC643F2F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270m-plus\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7710F47C-C723-4F97-8A17-1BA8F1005255", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270m-plus\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "93B6459E-CE0C-4344-8D63-C0116AB32796", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170m-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9B69866D-4F3C-42B3-9B20-62137551CE9C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170m-c:-:*:*:*:*:*:*:*", matchCriteriaId: "B346C94B-7A59-47A1-B2F6-A888968B7FE3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170m-cm-b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9F09095A-1795-4FDB-A1B5-5FC584E1191F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170m-cm-b:-:*:*:*:*:*:*:*", matchCriteriaId: "88504A31-F003-4344-BD7E-A1D5F0970FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170s1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6D61D6C5-4FB2-410D-A74D-1792054C6C04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170s1:-:*:*:*:*:*:*:*", matchCriteriaId: "5650BA0D-6066-42A2-8062-3FF81009E10B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A3B9CE8-C405-4C88-A6B1-5D5A3414096D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170t:-:*:*:*:*:*:*:*", matchCriteriaId: "EF01DCA7-9A31-4B2F-A34A-FA45E97522F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170t_v2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77F596F0-6418-4D20-86C5-B48B027EC265", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170t_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "9F40FF26-207F-41C7-8E82-7AD6681AE0DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170m2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "59E33941-7E24-4FC8-941C-CC62B6B58822", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170m2:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B670DE-DB47-418B-A2C4-E68C49C2FAAE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170m2\\/cdm\\/si_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69369624-8D90-4A2A-8B85-8884AC5CBD28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170m2\\/cdm\\/si:-:*:*:*:*:*:*:*", matchCriteriaId: "A851E8E1-B1F0-4083-AFA8-3F59779F0206", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_q270m-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD61F9CE-68E5-481C-9711-B40343FF90CE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_q270m-c:-:*:*:*:*:*:*:*", matchCriteriaId: "56E41F36-3579-4AE4-8E7E-20D81962EA79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q270m-cm-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "233065C5-57E6-40E5-8A52-AE6D6F7196AA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q270m-cm-a:-:*:*:*:*:*:*:*", matchCriteriaId: "2A571EB0-25AB-4450-8847-042749CE5F7D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q270-s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E8030ED2-0286-420A-B514-AC986C2700BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q270-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F4E56764-2A59-4B73-89A1-9D391FE33D5A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_j3355i-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0520B4BF-4363-4747-86A9-5D481927CF4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_j3355i-c:-:*:*:*:*:*:*:*", matchCriteriaId: "94719387-576F-4949-AA4D-6C8453085EBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_x_hero_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8F854F8A-CD36-4721-A1D2-5E6EC5D9FF45", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_x_hero:-:*:*:*:*:*:*:*", matchCriteriaId: "9820DF03-00B5-4363-AAE7-9D8F2FCBA91B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_x_formula_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DA24153A-AE9B-4F76-9DFF-E00AB46744BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_x_formula:-:*:*:*:*:*:*:*", matchCriteriaId: "86DEDFC2-7A73-40F6-BDCB-8E135BFC4EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_x_code_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53223DBA-DAA1-4942-92D1-68B7647D07AD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_x_code:-:*:*:*:*:*:*:*", matchCriteriaId: "8E633481-0AD2-4291-8653-FEB3DA5DA279", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_x_apex_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "272713A3-B88D-405B-AF30-FC6E90F2E3DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_x_apex:-:*:*:*:*:*:*:*", matchCriteriaId: "DCE784AA-CC5A-4995-92AC-28073BABD832", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z370-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C8260D7C-031B-489F-A7B9-1DEFC846BCD5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z370-a:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A56C38-B2C6-4F19-806A-9346190BD7AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z370-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C1536F2E-3181-4897-8ABD-AB2B939DF992", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z370-p:-:*:*:*:*:*:*:*", matchCriteriaId: "DD78127D-4BCD-4733-ABC1-D8558BE07C3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:tuf_z370-pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1419951-3645-4CBF-8EE0-209DC1727E92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:tuf_z370-pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "E78CF821-AFD7-4E76-BB94-A45495ABEC37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:tuf_z370-plus_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "060358B9-3630-421B-9366-F726D19C15D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:tuf_z370-plus_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "E8678C89-35A9-4256-AF4A-CC3A11BDB540", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z370-g_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1579A407-454F-4838-8850-8D4057507C8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z370-g_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "6A138826-DC79-4620-9142-2B7030DFCEAA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z370-e_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F050E14C-429C-421D-A01C-CC8E1DB40769", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z370-e_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "087C89AA-9876-4754-B2B1-CAE4F86D1375", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z370-f_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F62BFA52-B89C-410E-9FC6-B6F39825515A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z370-f_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "7B49B4BB-6D24-43A1-81DF-E786DFA600F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z370-h_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48EBFFF2-0AF5-43F7-AAC2-89F4625F9185", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z370-h_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "271701A1-CFD4-4781-9F81-3255D90F8EE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z370-i_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6681601-99E9-492B-86BF-9C3BE23D1E9C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z370-i_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "FA8A2D55-C766-4E90-BB0E-2D912F17C768", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A15E9E54-0414-4C67-9DCD-181FCF2EE838", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*", matchCriteriaId: "C6127C45-E91E-46B7-A806-FC0068575DB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4487A96-6AF1-4F41-9FF7-ED711FB89FA4", versionEndExcluding: "18.01.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADAD919-32C1-49D2-A419-C9A803DB6250", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0E79A718-EEED-4C35-8B3A-8BDEFBC55282", versionEndExcluding: "22.01.04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", matchCriteriaId: "506DEE00-30D2-4E29-9645-757EB8778C0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC70C5D2-748E-4D6C-ADC9-ED098541C8F1", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", matchCriteriaId: "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FDFE3D1F-F8B4-4682-BBCC-2CBD3CFFFBD4", versionEndExcluding: "21.01.07", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", matchCriteriaId: "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "631AF2A2-F925-45CB-82DE-39053016F5B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", matchCriteriaId: "754A6744-5194-4A99-BD3B-944A8707C80F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc477d_pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "71E7F6E0-9D8F-40CF-BC30-43505FE0CC16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc477d_pro:-:*:*:*:*:*:*:*", matchCriteriaId: "FAA84FF5-0C2A-48DE-94A5-ACB5B01E03EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90723D2B-49B7-4F70-9DD1-DE9F602E8DA2", versionEndExcluding: "21.01.07", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", matchCriteriaId: "FDF9D4C3-1892-48FA-95B4-835B636A4005", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42E364B9-1FC7-418A-860D-DD0E73DD930E", versionEndExcluding: "7.1.91.3272", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*", matchCriteriaId: "9DCF5972-C72D-4DE9-8B73-3C497D54596B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD389CE-AA26-445D-8D2B-27D3D06C3B68", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", matchCriteriaId: "D9DD4A97-1648-4C7F-A5A0-6899BD13A617", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BBC1791E-E3B5-4B75-B816-9EE20F44D9D6", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*", matchCriteriaId: "CD1A57A9-F6E5-4672-BD22-09EF5522CA10", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "042B60E7-0614-4EB3-8B47-07DEE5B5E274", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", matchCriteriaId: "509AD120-3465-4C00-AAB3-B6F6ED708B51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*", matchCriteriaId: "E752006C-6D94-4B14-B3A5-C9BB94141BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", matchCriteriaId: "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", matchCriteriaId: "057D9947-CE4A-4B4C-B721-4B29FB71350C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C5DA136-7541-44E4-B8DF-065CEE065A99", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*", matchCriteriaId: "1FFD2D72-5464-4B86-BACB-61F55A081C3A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C37BC27-C5B9-4740-BDFE-9439FB248CE6", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", matchCriteriaId: "E6D87239-40C1-4038-B734-D77AC4DDD571", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5C3B3FD-7CF7-4172-87EC-11C129D5508A", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*", matchCriteriaId: "687E1212-EC5A-47BA-ACAB-74F6C98B7C34", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4EAE137-9336-43D6-AF8A-9161F236BD14", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", matchCriteriaId: "D8F37D88-E086-4060-8420-BD0F8D8FF580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D2F29FED-7876-4801-B0B1-BC06A30B1310", versionEndExcluding: "23.01.03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", matchCriteriaId: "187C6D51-5B86-484D-AE0F-26D1C9465580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3AD2CE43-B3B3-480B-A607-BB5817B43256", versionEndExcluding: "17.02.06.83.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*", matchCriteriaId: "A49883F4-8360-4895-8E9E-B274A35BDE57", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinumerik_pcu50.5-c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BF57DC28-0EF6-4610-8B3C-587B79740D25", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinumerik_pcu50.5-c:-:*:*:*:*:*:*:*", matchCriteriaId: "E921D034-33C4-4526-8F94-98D580922409", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "578D9CB9-6831-41C5-99C3-E1940562F118", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinumerik_pcu50.5-p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CE0F71E-62D3-463E-9CE2-E088D6D3F05A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.", }, { lang: "es", value: "Desbordamiento de búfer en el kernel en Active Management Technology (AMT) en Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 permite que un atacante con acceso local al sistema ejecute código arbitrario con el privilegio de ejecución AMT.", }, ], id: "CVE-2017-5712", lastModified: "2024-11-21T03:28:16.610", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-11-21T14:29:00.540", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101920", }, { source: "secure@intel.com", tags: [ "Issue Tracking", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039852", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", }, { source: "secure@intel.com", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", }, { source: "secure@intel.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20171120-0001/", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101920", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039852", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20171120-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:08
Severity ?
Summary
Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | active_management_technology_firmware | * | |
netapp | cloud_backup | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "17A6A8CF-C605-4C80-B46E-44382ADCA985", versionEndExcluding: "15.0.35", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.", }, { lang: "es", value: "Una desreferencia de puntero null en el subsistema para Intel(R) AMT versiones anteriores a 15.0.35, puede permitir a un usuario autenticado habilitar potencialmente una denegación de servicio por medio del acceso a la red", }, ], id: "CVE-2021-33068", lastModified: "2024-11-21T06:08:13.870", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-09T23:15:15.230", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220210-0006/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220210-0006/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 04:59
Severity ?
Summary
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.", }, { lang: "es", value: "Una lectura fuera de límites en el subsistema en Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario privilegiado para permitir potencialmente una divulgación de información por medio de un acceso local", }, ], id: "CVE-2020-12356", lastModified: "2024-11-21T04:59:33.990", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:14.817", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-09-10 15:16
Modified
2024-11-21 05:39
Severity ?
Summary
Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "D4162A8B-896F-4B18-8D6D-60320C587744", versionEndExcluding: "11.8.79", versionStartIncluding: "11.8", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "8FAA2057-7FF1-4EE0-974F-767E7CF9F239", versionEndExcluding: "11.12.79", versionStartIncluding: "11.12", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "DFE3FF6A-3F10-43F8-8400-653A015E1431", versionEndExcluding: "11.22.79", versionStartIncluding: "11.22", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "C85C642D-DE4F-4052-8549-A5741164C0B3", versionEndExcluding: "12.0.68", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "4CAAB4E4-FC0B-4B5E-A359-5A5FAF91F135", versionEndExcluding: "14.0.39", versionStartIncluding: "14.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C1C4C98-F1D3-4604-9434-081B02F9AC37", versionEndExcluding: "11.8.79", versionStartIncluding: "11.8", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4470D98C-163E-4C00-9AFD-EFDA03A520FE", versionEndExcluding: "11.12.79", versionStartIncluding: "11.12", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "737C8627-6B2E-4371-AA30-5324F65717E6", versionEndExcluding: "11.22.79", versionStartIncluding: "11.22", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4EB57A8-E655-4AA9-AEA7-1A7848F743D7", versionEndExcluding: "12.0.68", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A4A1AB1-7557-490A-9B76-2F6F7FEEBF93", versionEndExcluding: "14.0.39", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.", }, { lang: "es", value: "Unas restricciones de búfer inapropiadas en el subsistema de red en Intel(R) AMT e Intel(R) ISM aprovisionado versiones anteriores a 11.8.79, 11.12.79, 11.22.79, 12.0.68 y 14.0.39, pueden permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegio por medio del acceso a la red. En sistemas no aprovisionados, un usuario autenticado puede habilitar potencialmente una escalada de privilegios por medio del acceso local", }, ], id: "CVE-2020-8758", lastModified: "2024-11-21T05:39:23.397", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-10T15:16:53.827", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20200911-0005/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20200911-0005/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "F18CD125-5319-4955-ADEA-24073521E975", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B907926D-451E-4435-AEC2-2E5DBA695AE7", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "564A5BEF-C36A-4D8E-B458-D3083294AFCD", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "A433A19A-BBC9-4A5A-8D55-31371F91ABDA", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Una comprobación de entrada inapropiada en el subsistema DHCPv6 en Intel® AMT e Intel® ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red", }, ], id: "CVE-2020-0596", lastModified: "2024-11-21T04:53:49.500", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:11.597", references: [ { source: "secure@intel.com", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "503E551C-FC5F-4ABC-8DEA-E360701F0B33", versionEndExcluding: "22.01.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", matchCriteriaId: "506DEE00-30D2-4E29-9645-757EB8778C0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", versionEndExcluding: "21.01.09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", matchCriteriaId: "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B5B6E6B-16A0-4236-AABE-82385B53EC78", versionEndExcluding: "21.01.09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", matchCriteriaId: "FDF9D4C3-1892-48FA-95B4-835B636A4005", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D476D093-4A97-499C-B40D-7A301BC9AA2E", versionEndExcluding: "r1.30.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", matchCriteriaId: "F6A757F1-E478-4A3D-8D5F-C996E176A11A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D", versionEndExcluding: "r1.23.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", matchCriteriaId: "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "790D244A-AC3D-4BBC-9139-A90048FD375A", versionEndExcluding: "19.02.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", matchCriteriaId: "509AD120-3465-4C00-AAB3-B6F6ED708B51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C046182-BB33-41D0-B041-1566B8041917", versionEndExcluding: "19.01.14", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", matchCriteriaId: "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8DE74300-E061-452E-AD1D-6DD7C2C62729", versionEndExcluding: "19.02.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", matchCriteriaId: "057D9947-CE4A-4B4C-B721-4B29FB71350C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE4A7C13-6F81-4629-9C28-9202028634AE", versionEndExcluding: "19.02.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", matchCriteriaId: "E6D87239-40C1-4038-B734-D77AC4DDD571", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93485235-481B-4BAF-BB7A-81BB5AA1BC53", versionEndExcluding: "19.01.14", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", matchCriteriaId: "D8F37D88-E086-4060-8420-BD0F8D8FF580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AD949046-46E5-48C9-883B-92F04926E8BC", versionEndExcluding: "23.01.04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", matchCriteriaId: "187C6D51-5B86-484D-AE0F-26D1C9465580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C23AFAB4-B286-4FD6-ABC3-86B2881E271C", versionEndExcluding: "12.0.5", versionStartIncluding: "11.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D5FAD938-027A-406F-9E7C-1BFD992839F4", versionEndExcluding: "12.0.5", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63591E72-6038-4417-BA10-54180507AF0F", versionEndExcluding: "11.0", versionStartIncluding: "9.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.", }, { lang: "es", value: "Múltiples desbordamientos de búfer en Intel AMT en el firmware Intel CSME en versiones anteriores a la 12.0.5 podrían permitir que un usuario no autenticado con Intel AMT provisionado provoque una denegación de servicio (DoS) parcial mediante acceso de red.", }, ], id: "CVE-2018-3658", lastModified: "2024-11-21T04:05:51.020", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-09-12T19:29:02.967", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106996", }, { source: "secure@intel.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106996", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180924-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-772", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Unas credenciales insuficientemente protegidas en Intel® AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, pueden permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red", }, ], id: "CVE-2020-0540", lastModified: "2024-11-21T04:53:42.090", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:11.017", references: [ { source: "secure@intel.com", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-522", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "F18CD125-5319-4955-ADEA-24073521E975", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B907926D-451E-4435-AEC2-2E5DBA695AE7", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "564A5BEF-C36A-4D8E-B458-D3083294AFCD", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "A433A19A-BBC9-4A5A-8D55-31371F91ABDA", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, { lang: "es", value: "Un uso de la memoria previamente liberada del subsistema IPv6 en Intel® AMT e Intel® ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso de red", }, ], id: "CVE-2020-0595", lastModified: "2024-11-21T04:53:49.383", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:11.517", references: [ { source: "secure@intel.com", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", url: "https://www.kb.cert.org/vuls/id/257161", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.kb.cert.org/vuls/id/257161", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | active_management_technology_firmware | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853", versionEndExcluding: "12.0.45", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.", }, { lang: "es", value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso físico.", }, ], id: "CVE-2019-11086", lastModified: "2024-11-21T04:20:30.667", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-18T22:15:12.033", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "64F972AA-4420-4983-B0DF-085CAE58E51D", versionEndIncluding: "11.8.76", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "49B19589-FF5A-4908-8317-6E2DDDF40DD0", versionEndIncluding: "11.11.76", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "89D1B44A-5783-480A-BB32-2A96012B5C2A", versionEndIncluding: "11.22.76", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "2184BE20-E41F-4FE9-9897-C9BB527B45D0", versionEndIncluding: "12.0.63", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "350276F5-E8F5-4261-B7C5-7662F21782D0", versionEndIncluding: "13.0.31", versionStartIncluding: "13.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E9E73D17-715D-4BA9-9E45-FBC09587973E", versionEndIncluding: "14.0.32", versionStartIncluding: "14.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB0A7300-2C3E-493F-9FC7-95376E2730B3", versionEndIncluding: "11.8.76", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F5BFB6EB-4B20-49A3-9307-B905C419554E", versionEndIncluding: "11.11.76", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5538026-BEA0-4764-94BE-D09CFE74FCC5", versionEndIncluding: "11.22.76", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B221B839-F12B-41D3-BB8F-CF552FFA11F3", versionEndIncluding: "12.0.63", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DBCF8CDE-05FD-48F7-BE29-68984E401B28", versionEndIncluding: "13.0.31", versionStartIncluding: "13.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DE4AF2ED-BFCB-4DCB-8E9A-CFEF652EDD11", versionEndIncluding: "14.0.32", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.", }, { lang: "es", value: "Una lectura fuera de límites en el subsistema IPv6 en Intel® AMT e Intel® ISM versiones anteriores a 14.0.33, puede permitir a un usuario no autenticado habilitar potencialmente una denegación de servicio por medio de un acceso de red", }, ], id: "CVE-2020-0597", lastModified: "2024-11-21T04:53:49.610", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:11.660", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.kb.cert.org/vuls/id/257161", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.kb.cert.org/vuls/id/257161", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_20_15", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "95326EF3-92B2-476F-AEF9-D4692A49FFAC", versionEndExcluding: "11.8.60", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "572374F4-5C63-4528-BA91-44451C875615", versionEndExcluding: "11.11.60", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1117F59A-0D3B-4519-85BC-223EB48A77F8", versionEndExcluding: "11.22.60", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6ABEE2AC-86FA-4693-BEFA-6FB3B671ECC2", versionEndExcluding: "12.0.20", versionStartIncluding: "12.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.", }, { lang: "es", value: "Validación de entradas insuficiente en Intel(R) Active Management Technology (Intel(R) AMT), en versiones anteriores a las 11.8.60, 11.11.60, 11.22.60 o 12.0.20, podría permitir que un usuario no autenticado pueda provocar una denegación de servicio mediante acceso de red.", }, ], id: "CVE-2018-12187", lastModified: "2024-11-21T03:44:43.200", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-14T20:29:00.317", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190318-0001/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190318-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | active_management_technology_firmware | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853", versionEndExcluding: "12.0.45", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, { lang: "es", value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios mediante el acceso a la red.", }, ], id: "CVE-2019-11107", lastModified: "2024-11-21T04:20:33.030", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-18T22:15:12.957", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Severity ?
Summary
Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*", matchCriteriaId: "8F249992-79C7-4005-9804-97FFFAC658E7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*", matchCriteriaId: "81C6DAFF-FD39-434C-8426-4BE5F39355EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*", matchCriteriaId: "2EE259EF-22F6-4AA1-BDF6-448E15B96F14", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*", matchCriteriaId: "EFED12C9-2563-4036-BEBC-DD9D67095917", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*", matchCriteriaId: "18155178-43F1-48A6-AC0E-9578031F7F04", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*", matchCriteriaId: "4C47688B-1D40-4D73-B363-E2E8230588FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*", matchCriteriaId: "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*", matchCriteriaId: "72BF929E-1288-448A-83A4-D26D86D26EF9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*", matchCriteriaId: "C8E4CB07-1768-4C18-ACAD-73773042C752", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*", matchCriteriaId: "31465D8E-A705-4AE3-AB2A-C296554E514C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*", matchCriteriaId: "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*", matchCriteriaId: "D8B2D356-DD32-46E0-9459-67E10AE44104", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*", matchCriteriaId: "27CDF6AC-7356-417F-84F6-33E9E3AA2082", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*", matchCriteriaId: "E8E6F0AF-78AC-4257-9164-A9A4CCA05968", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*", matchCriteriaId: "5DA61740-3E29-4820-9897-9BCB90490D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*", matchCriteriaId: "633350BA-34B4-4927-82B9-B44D1286D8FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*", matchCriteriaId: "D2E687A6-87AA-4F3A-98AB-A164EC0EE051", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*", matchCriteriaId: "53A8F993-32F4-487A-A33D-814BCDF1FAB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*", matchCriteriaId: "09EC7A10-C2AB-4DD4-9C75-073344F635E9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*", matchCriteriaId: "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*", matchCriteriaId: "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*", matchCriteriaId: "0C83B3D2-E293-4D33-AE5B-1789466696DB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*", matchCriteriaId: "CB399F3F-7C6E-463E-B822-A4365A4C290A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*", matchCriteriaId: "F5175C41-110B-4C26-80CB-C25DA11F639B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*", matchCriteriaId: "63DAF721-A7E8-4263-869D-D9E100D7C598", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*", matchCriteriaId: "F79057F7-72D3-4176-BBDD-E9A362153E66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*", matchCriteriaId: "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*", matchCriteriaId: "FD65648B-B7DB-432F-8F88-6C624F94F809", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*", matchCriteriaId: "7A949D34-E086-4821-B73A-DCCFDD6C5616", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*", matchCriteriaId: "93055544-064D-46FE-92E4-48F69DDD29B8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*", matchCriteriaId: "9A98184C-18F5-424C-BB74-9A8094B5992C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*", matchCriteriaId: "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*", matchCriteriaId: "3EB52214-6E22-49BF-B2F6-0AA282108E0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*", matchCriteriaId: "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*", matchCriteriaId: "F8E0DA72-76B5-4022-BBFA-B886F0F662CE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*", matchCriteriaId: "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*", matchCriteriaId: "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*", matchCriteriaId: "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*", matchCriteriaId: "0F67F016-A068-4079-AAE5-B247BBAE1B2A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*", matchCriteriaId: "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*", matchCriteriaId: "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*", matchCriteriaId: "DD57E072-FF46-4637-B7CF-D6C2F3BA8782", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*", matchCriteriaId: "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*", matchCriteriaId: "4B18E14C-4DC4-4AEB-8792-968D893BA402", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*", matchCriteriaId: "B706F7E4-8169-48A5-86D1-3592D3D9B845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*", matchCriteriaId: "808DAAA6-9047-49A1-BC0B-9D4725299CA2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*", matchCriteriaId: "57EFA3F2-5C76-48AF-931F-7463633370A5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*", matchCriteriaId: "A6FF59F0-9F30-448F-A109-B90FCC513CBD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*", matchCriteriaId: "07EFB7B3-772A-476D-B30F-2A442F64928F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*", matchCriteriaId: "41A69B9F-EF79-4642-A2A8-75395AD7506E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*", matchCriteriaId: "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*", matchCriteriaId: "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*", matchCriteriaId: "6C6D7877-1990-481F-9CFF-81A2BD39DA6F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*", matchCriteriaId: "6A17D56F-D53C-4198-B7EF-95BAA4711B3B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*", matchCriteriaId: "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*", matchCriteriaId: "E13892FB-C1D0-4C46-A171-9D055E58DE0B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*", matchCriteriaId: "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*", matchCriteriaId: "DB830245-29AF-4F0E-9C12-6BED7E76609D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*", matchCriteriaId: "17ACD170-347E-4DF5-AE0D-DF00854480A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*", matchCriteriaId: "3B8BCF08-D863-435F-9E70-78C7542A3C0C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*", matchCriteriaId: "9E57F037-EE11-4148-A214-0650A98A07F4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*", matchCriteriaId: "F641F2A7-64C7-43DB-862B-B7117E1B9CBC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*", matchCriteriaId: "51086E20-8A3D-4A68-8048-D385865D50FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*", matchCriteriaId: "2621BF41-EFD1-4C8A-9426-A937B68DC71E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*", matchCriteriaId: "713DC902-5264-42CB-BB22-3566A4528FED", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*", matchCriteriaId: "28554810-9989-47B2-9CF1-E421D534777E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*", matchCriteriaId: "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*", matchCriteriaId: "4DD23345-C583-4E30-A9FE-B0C485606ECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*", matchCriteriaId: "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*", matchCriteriaId: "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*", matchCriteriaId: "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*", matchCriteriaId: "E8BBEBBD-8F88-474B-A40B-7270B500AAC2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*", matchCriteriaId: "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*", matchCriteriaId: "7471E5CD-7211-474C-856F-51C199479407", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*", matchCriteriaId: "E785FA6F-A7BE-46A3-B384-029E55793DDA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*", matchCriteriaId: "2A3A4148-B91B-4799-B055-21F4A7FA74A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*", matchCriteriaId: "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*", matchCriteriaId: "353E8397-B63B-4879-9D3D-610F65929184", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*", matchCriteriaId: "D91D2C07-10D0-49F0-B353-19E34C438CEC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*", matchCriteriaId: "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*", matchCriteriaId: "F18363D9-C7D8-4C9F-9A50-33725FFE6558", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*", matchCriteriaId: "267E5275-7D50-4EF6-AB1D-7ECA894ED71B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*", matchCriteriaId: "06B91A77-76F0-41CA-B23B-69F431F0D1AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*", matchCriteriaId: "D9F01332-C259-4F3B-ABE9-C34DAC18FC18", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*", matchCriteriaId: "B9EA80D9-6A3B-42AF-B609-7429755BE504", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*", matchCriteriaId: "40B500EC-20B8-42D2-A5DF-956C96FBEB12", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*", matchCriteriaId: "D55B01E2-6783-494E-BCB9-C75D2CA042D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*", matchCriteriaId: "8D31A976-9C00-42AC-8DA1-D8B39564F456", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*", matchCriteriaId: "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*", matchCriteriaId: "A90F5756-47A1-4512-848E-3070E42506EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*", matchCriteriaId: "FDB161B7-D329-41FB-97C3-2C1EB16F74C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", matchCriteriaId: "03D0265F-840B-45A1-90BD-9ED8846A9F63", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", matchCriteriaId: "74BAC0EC-2B38-4553-A399-4BD5483C4753", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", matchCriteriaId: "4477EBA6-F0A7-452B-96E8-BA788370CCA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", matchCriteriaId: "1285D817-B5B8-4940-925D-FCDD24810AE6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", matchCriteriaId: "D289F7B4-27CD-4433-BB45-06AF98A59B7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", matchCriteriaId: "00168903-6012-4414-87D1-2EE52AA6D78E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", matchCriteriaId: "6AE8D524-577E-4994-8A4B-D15022C84D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", matchCriteriaId: "75977B0B-C44D-43BC-8D7A-AF966CDB1901", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", matchCriteriaId: "AE7F5D52-9F41-49A4-B941-E0D777203FF7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", matchCriteriaId: "52B5B3FD-5BEA-4DE8-B010-55FED1547167", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", matchCriteriaId: "167B1B04-5823-4038-A019-3975A3B447C9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", matchCriteriaId: "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", matchCriteriaId: "1BA096E0-5480-47CB-822B-D11D7E20F69F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", matchCriteriaId: "30357469-0B8F-4385-A282-2F50181EA442", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", matchCriteriaId: "3BE70772-7796-4594-880A-6AAD046E4D8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", matchCriteriaId: "1A9E2F8D-2974-4833-9EC2-233CEE257C26", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", matchCriteriaId: "17EE3078-454F-48F8-B201-3847DB40D5C4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", matchCriteriaId: "EE32C500-55C2-41A7-8621-14EBF793BF11", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", matchCriteriaId: "52D3DF52-501A-4656-98F1-8DD51D04F31F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", matchCriteriaId: "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", matchCriteriaId: "09578301-CF39-4C24-951A-535743E277EF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", matchCriteriaId: "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", matchCriteriaId: "5A65F303-96C8-4884-8D6F-F439B86BA30C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", matchCriteriaId: "1E046105-9DF5-425F-A97E-16081D54613C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", matchCriteriaId: "B2987BCF-39E6-49B6-8DEE-963A38F12B07", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", matchCriteriaId: "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", matchCriteriaId: "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", matchCriteriaId: "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", matchCriteriaId: "61D6E3CC-79B1-4995-9A76-41683C7F254A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", matchCriteriaId: "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", matchCriteriaId: "6FE5773D-3CD1-4E63-8983-E0105C46D185", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", matchCriteriaId: "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", matchCriteriaId: "18B3A53B-902C-46A5-8CE7-B55102703278", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", matchCriteriaId: "AB843479-729A-4E58-8027-0FC586F051AA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", matchCriteriaId: "1AF5A233-1E77-49FD-AC2C-60D185481E28", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", matchCriteriaId: "18519CF2-B0DA-42DD-8A3E-9084298C210A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", matchCriteriaId: "329D5FCF-7EC5-4471-906B-3619A180BD52", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", matchCriteriaId: "96CC28B6-57D1-4919-AA55-A262CC16AFE6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", matchCriteriaId: "0EB4C54D-1265-425A-B507-E1099844875A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", matchCriteriaId: "97362147-3A71-430D-9064-4435D45C3B8C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", matchCriteriaId: "89212CF3-4E99-4389-94CE-F4211DDCA01B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", matchCriteriaId: "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", matchCriteriaId: "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", matchCriteriaId: "36F027D9-DCB4-4A3D-8987-41F2941DBD45", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", matchCriteriaId: "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", matchCriteriaId: "4924CE39-A846-4DB4-9547-6322FC5AD6B3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", matchCriteriaId: "6C9E2C9A-94A1-456B-90D5-54932DF64C22", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", matchCriteriaId: "AC04C652-B2D8-4002-A50E-8AFE83204A25", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", matchCriteriaId: "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", matchCriteriaId: "754A8826-59F7-4A71-B74B-737BE9C7DE4F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", matchCriteriaId: "FADB6BDA-6825-489B-AB39-7729BA45DFD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", matchCriteriaId: "7913F57E-E600-4767-AF51-D045E1898E72", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", matchCriteriaId: "BD3783F4-5A05-45AA-9791-A681011FD78C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", matchCriteriaId: "01E3114D-31D2-4DBF-A664-F4049D8B6266", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", matchCriteriaId: "D8EE6578-981D-470C-BB24-4960B3CB1478", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", matchCriteriaId: "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", matchCriteriaId: "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", matchCriteriaId: "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", matchCriteriaId: "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", matchCriteriaId: "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", matchCriteriaId: "4417007D-126A-478B-87EA-039D088A4515", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", matchCriteriaId: "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", matchCriteriaId: "EF2FA85D-B117-410D-B247-8C5A3479319A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", matchCriteriaId: "3A041D27-132C-4B15-976F-1750C039A89F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", matchCriteriaId: "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", matchCriteriaId: "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", matchCriteriaId: "088BC395-06D5-4156-85EB-63C4A9552898", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", matchCriteriaId: "33A220A2-A6D2-46A7-B168-607400EEDCE3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", matchCriteriaId: "1E79232F-7196-440B-82D4-165885251232", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", matchCriteriaId: "ED866954-77AB-4CA8-8AED-4252C595FC4D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", matchCriteriaId: "28A1F516-B180-45D4-8EB1-754B7497CB2B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", matchCriteriaId: "36758A04-64D3-4150-A004-CF042FA31CD9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", matchCriteriaId: "1E01752E-F1DD-400A-A917-216CAF15B0F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", matchCriteriaId: "AD47EC58-F776-4F59-8F15-4B208904CF4B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", matchCriteriaId: "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", matchCriteriaId: "94565E35-8A58-4CB6-A489-C796DCB97FC5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", matchCriteriaId: "49964D35-5323-4412-BD54-661630F9A8CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", matchCriteriaId: "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", matchCriteriaId: "A0F66468-87D0-41FC-934B-5924BE2956CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", matchCriteriaId: "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", matchCriteriaId: "45C0D99E-443E-4AB1-A07A-900A09FE177E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", matchCriteriaId: "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", matchCriteriaId: "A9DAEE52-09C3-4A09-9958-9D6807B2700B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", matchCriteriaId: "B97690D4-E814-4D40-B170-BE56D7AE2C1B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", matchCriteriaId: "89804F2C-D32D-4444-ABEA-5B241153D096", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", matchCriteriaId: "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", matchCriteriaId: "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", matchCriteriaId: "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", matchCriteriaId: "7C27B318-2AC1-423D-B0C8-583BB1800D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", matchCriteriaId: "9E58E3D0-1154-4B13-BA16-67CE67DF0637", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", matchCriteriaId: "32D2ACB3-B906-4944-A021-03C4645965BD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", matchCriteriaId: "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", matchCriteriaId: "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", matchCriteriaId: "CB5BF932-459F-4DD2-B160-5FE0371C7D83", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", matchCriteriaId: "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", matchCriteriaId: "783D6EA7-C016-4314-A87B-4FED1DC7114B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", matchCriteriaId: "7AD0176F-FFAE-4A85-9327-CE72FE059E90", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", matchCriteriaId: "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", matchCriteriaId: "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", matchCriteriaId: "CB7F9D65-5537-4C25-B02B-2393F60D1299", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", matchCriteriaId: "F09C8A92-820D-4572-A797-180E17A7DEB6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", matchCriteriaId: "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", matchCriteriaId: "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", matchCriteriaId: "0C04557A-C508-4FAD-A535-1C0AEFF08075", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", matchCriteriaId: "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", matchCriteriaId: "429A99C8-BC55-4887-893C-7124C1A5DB08", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", matchCriteriaId: "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", matchCriteriaId: "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", matchCriteriaId: "6F1F1377-6220-43FB-BEF9-BAA7B0158147", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", matchCriteriaId: "18422CA8-3000-46B1-9065-2369E6B0BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", matchCriteriaId: "5D558C66-E80E-4FC7-A0DF-485466390C46", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", matchCriteriaId: "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", matchCriteriaId: "860F22F6-4C87-47C5-965E-02A1AFF41A72", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", matchCriteriaId: "19A2CA86-BFA8-4C78-987D-AD26F32622F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", matchCriteriaId: "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", matchCriteriaId: "425F6D34-EE60-464B-8EA6-8116EDAA1219", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", matchCriteriaId: "CEB9F657-1239-4424-A2E8-F8BD98C0095E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", matchCriteriaId: "F631403C-0A67-42CB-815C-133EB87E0C95", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", matchCriteriaId: "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", matchCriteriaId: "0453C0EA-BA67-49D5-964F-35493F97D905", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", matchCriteriaId: "4D4D237E-ACB7-4382-AF5B-D27E634BF867", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", matchCriteriaId: "B5461EB2-2958-4923-86AF-C74D449120B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", matchCriteriaId: "45C22141-E698-4E38-AF50-9CE04C1168FE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", matchCriteriaId: "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", matchCriteriaId: "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", matchCriteriaId: "713C4B7A-C38A-4818-A258-D07DEDEC906E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", matchCriteriaId: "C59740BE-FC30-4400-B978-1DB41282971C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", matchCriteriaId: "839728F0-5F23-462F-B493-C37EE4C874F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", matchCriteriaId: "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", matchCriteriaId: "D452F1BF-1FA5-463C-8F13-6357509FB5D1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", matchCriteriaId: "EF6D1F4C-B396-468C-BA32-9367A68C95DD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", matchCriteriaId: "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", matchCriteriaId: "6E001AAB-07EC-47BF-BDE9-BB927872781D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", matchCriteriaId: "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", matchCriteriaId: "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", matchCriteriaId: "D024802A-EA60-4D9B-B04C-027A0703EABD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", matchCriteriaId: "BA731F3C-1F04-4EE2-83EC-9486F5032903", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", matchCriteriaId: "544A59F6-E731-43C8-8455-69256933E71D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", matchCriteriaId: "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", matchCriteriaId: "69A2701A-35A8-4268-B9CF-40BA3219373B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", matchCriteriaId: "15E671F6-8DED-4735-BE97-58A60E5B5C13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", matchCriteriaId: "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", matchCriteriaId: "AAC76F31-00A5-4719-AA50-92F773919B3C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", matchCriteriaId: "49996F5A-51B2-4D4E-AE04-E98E093A76CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", matchCriteriaId: "9F8406B0-D1E5-4633-B17E-53DC99FE7622", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", matchCriteriaId: "3D49435C-7C33-454B-9F43-9C10F28A28A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", matchCriteriaId: "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", matchCriteriaId: "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", matchCriteriaId: "ED44A404-8548-4EDC-8928-4094D05A6A38", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", matchCriteriaId: "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", matchCriteriaId: "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", matchCriteriaId: "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", matchCriteriaId: "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", matchCriteriaId: "2A06696D-37F0-427D-BFC5-1606E7441C31", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", matchCriteriaId: "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", matchCriteriaId: "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", matchCriteriaId: "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", matchCriteriaId: "61309100-CFA7-4607-A236-8910838AA057", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", matchCriteriaId: "82D76265-7BD0-4C51-AE77-22B22524DE81", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", matchCriteriaId: "DE38B195-BB8D-4747-881D-E8033760B4C8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", matchCriteriaId: "1AA8BE76-168D-48A3-8DF6-E91F44600408", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", matchCriteriaId: "3B656975-5D71-4712-9820-BDB7BC248AFA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", matchCriteriaId: "FA045267-114D-4587-B6D7-E273C28DC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", matchCriteriaId: "77018415-E122-406E-896D-1BC6CF790BE3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", matchCriteriaId: "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", matchCriteriaId: "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", matchCriteriaId: "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", matchCriteriaId: "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", matchCriteriaId: "15D689D6-8594-42F2-8EEF-DCAEBA885A67", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", matchCriteriaId: "A6446000-0494-4DC5-ABAA-F20A44546068", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", matchCriteriaId: "99B94EEC-6690-45D0-B086-F4A5B25C25CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", matchCriteriaId: "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", matchCriteriaId: "832AB3CD-E3A1-4CCB-A210-287973563D0E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", matchCriteriaId: "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", matchCriteriaId: "99C4221A-9994-43B3-9C7A-E13815A50A10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", matchCriteriaId: "20070B1D-B91C-40BA-A9D8-E80170A2933F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", matchCriteriaId: "A70129C9-371F-4542-A388-C095869E593A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*", matchCriteriaId: "923D2D73-F953-44D2-9A25-E118136E8C5A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*", matchCriteriaId: "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*", matchCriteriaId: "AE2AEDB1-8C35-4210-B045-69216480B384", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*", matchCriteriaId: "484C1B49-7D90-4360-BE33-C1DAB755ED89", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*", matchCriteriaId: "C08FE92E-D97F-40E1-8482-1DA777EBC785", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*", matchCriteriaId: "2EBD6720-F788-4FD7-BC7F-AAEFAA137486", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*", matchCriteriaId: "08032549-991F-465D-8794-21C8ED2C98D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*", matchCriteriaId: "94514F41-CDCF-4EED-896E-8B5AE7360F0A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*", matchCriteriaId: "27F79141-5702-4157-8D13-FFB1C2F23FA2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*", matchCriteriaId: "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*", matchCriteriaId: "FF8D239C-B3D6-4F08-AF99-E64752B72346", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*", matchCriteriaId: "207507FE-1DC7-4569-A5A9-392290622EC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*", matchCriteriaId: "15FC32E2-9228-4903-9F0A-AF327A1C2D36", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*", matchCriteriaId: "FF50D5C4-DFC1-4306-B2C8-09D6788904FE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*", matchCriteriaId: "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*", matchCriteriaId: "62783CBF-1299-4045-A0D9-E95E7B385164", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*", matchCriteriaId: "3B04C754-50CD-4C8C-B56F-A50944EE5799", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*", matchCriteriaId: "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*", matchCriteriaId: "23BA712E-4516-4823-8E85-6AC24BE3240F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*", matchCriteriaId: "7C1303D7-33B3-48AA-BD62-74984AD22AF1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", matchCriteriaId: "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", matchCriteriaId: "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", matchCriteriaId: "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", matchCriteriaId: "1EC6ED02-134B-4322-AB72-75A0AB22701E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", matchCriteriaId: "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", matchCriteriaId: "8E1A41BA-A1D6-484A-BAD2-68DF85598354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", matchCriteriaId: "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", matchCriteriaId: "1C020F06-FD27-46E3-A48F-3F60F33BB969", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", matchCriteriaId: "03C74F10-6A7F-4F68-8A34-E981E1760DE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", matchCriteriaId: "24741B98-8D0E-4307-AAEF-A14B2531DCA9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", matchCriteriaId: "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", matchCriteriaId: "367FC8BA-F046-4264-A049-49E933E7698F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", matchCriteriaId: "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", matchCriteriaId: "C966A016-B650-44D9-B8C4-1ED50AB318DA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", matchCriteriaId: "DC448FF0-6D3F-4609-864B-4191905EE2B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", matchCriteriaId: "3FC68B2A-8570-4311-BB60-49DBBDAF7430", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", matchCriteriaId: "9826FA02-937E-4323-B9D5-8AE059ADBE95", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", matchCriteriaId: "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", matchCriteriaId: "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", matchCriteriaId: "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", matchCriteriaId: "326105AC-3926-437E-8AFF-916960107050", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", matchCriteriaId: "866E1275-7541-4B80-8FDF-53246A204C15", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", matchCriteriaId: "E190929D-D3CC-46E1-A903-0848829061DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", matchCriteriaId: "81E4EBCB-B660-4F6A-AD73-81B9D8964162", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", matchCriteriaId: "55D58CC5-CB46-464D-93B8-6AD5A19AF097", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", matchCriteriaId: "16541D3E-EBBD-4D92-96D8-F169733377AE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", matchCriteriaId: "3F08D257-F570-4D39-A6E8-0F60E55472E6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", matchCriteriaId: "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", matchCriteriaId: "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", matchCriteriaId: "233009BD-0DEC-405C-AD1A-B58AEB48B0DC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", matchCriteriaId: "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", matchCriteriaId: "A3D29927-72F4-4AF9-B096-57DB2712FBE1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", matchCriteriaId: "BA5AE231-F198-49EC-8A97-FF250A742840", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", matchCriteriaId: "22A6603F-9646-4220-BFCB-81266F1FC60E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", matchCriteriaId: "68E25472-7F96-425C-87DD-D1835B12589E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", matchCriteriaId: "09253F55-3355-44C1-862C-9A6DAD5C461C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", matchCriteriaId: "32CAE041-761F-4D81-B075-D3E567CFFE94", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", matchCriteriaId: "843E440C-3847-4B13-BB0C-E0C282853850", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", matchCriteriaId: "BEB1AF20-A65B-45F7-8C60-3475A640E2FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", matchCriteriaId: "154B92C1-04B9-459D-9FC7-6EA1E09CE12C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", matchCriteriaId: "2E0F9407-BCB5-4F50-8D54-74389DA58E15", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", matchCriteriaId: "60F6B441-537F-4255-9BC6-CE807B46DC55", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", matchCriteriaId: "CE7EFD6E-5954-4041-8245-0AB2D45E583F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*", matchCriteriaId: "8E0195D5-380D-401F-92EB-37AEA34E7478", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*", matchCriteriaId: "0E6AB8D9-FEA0-4830-941B-A2605830ADD0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", matchCriteriaId: "83A2B089-EF84-4CC6-BFF6-8E74584688CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", matchCriteriaId: "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", matchCriteriaId: "5427051C-F785-4190-86E4-7F6E226968B4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", matchCriteriaId: "B4E5D44F-183D-4B1B-8ACF-6954A834B63A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", matchCriteriaId: "96AEABB2-D597-4126-AEA2-D67117E86962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", matchCriteriaId: "1E84AC40-E06A-42B9-B125-E7263A191702", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", matchCriteriaId: "F1869D54-7B07-400D-8941-59DE0FE4127D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", matchCriteriaId: "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", matchCriteriaId: "AEC66A91-0BA2-4073-B4B7-E8354B3D2409", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", matchCriteriaId: "CAD36097-3356-49B6-93A4-B6AC9203C2A9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", matchCriteriaId: "9C0CE988-82FB-4412-AF06-91A1E056FD0B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", matchCriteriaId: "799CBCB6-5345-433A-9D2A-B36A86178982", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", matchCriteriaId: "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", matchCriteriaId: "16F2AE62-2E44-4F70-B790-1D5399DF61A7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", matchCriteriaId: "1EBF09B5-A51E-4579-A5E4-3B755CDDB737", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", matchCriteriaId: "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", matchCriteriaId: "7AC49B2C-12AB-463F-AB13-7C9A9E381014", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", matchCriteriaId: "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*", matchCriteriaId: "E40BD777-F766-4921-951C-7E38575ADA47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", matchCriteriaId: "6158ED8A-007E-48B7-99BF-8BA03BF584BD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", matchCriteriaId: "DBA7096A-F321-49A0-911A-F9683ABE6E6A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", matchCriteriaId: "6A471395-7F8F-4BA5-962D-4D8F271FAB47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", matchCriteriaId: "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", matchCriteriaId: "8010808D-805D-4CA3-9EA2-55EB1E57964C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", matchCriteriaId: "9716FE9F-A056-42A3-A241-F2FE37A6386A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", matchCriteriaId: "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", matchCriteriaId: "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", matchCriteriaId: "C5619D4D-9685-4595-8A5F-A18273FE4213", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", matchCriteriaId: "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", matchCriteriaId: "DAA3457E-7E1A-4878-9752-79382E954A66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", matchCriteriaId: "68630C63-4457-4E12-B7BD-AD456B237FC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", matchCriteriaId: "68A76015-0A05-4EC7-B136-DC13B55D881F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", matchCriteriaId: "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", matchCriteriaId: "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", matchCriteriaId: "3A649B47-E110-4C6C-AE60-13DB543CFE29", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", matchCriteriaId: "02377127-6C03-4FED-BB51-555B8E0DB223", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", matchCriteriaId: "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", matchCriteriaId: "100127DD-4981-46D3-95A7-D5C0585F097E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", matchCriteriaId: "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", matchCriteriaId: "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", matchCriteriaId: "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", matchCriteriaId: "6C4DE25F-168A-4C67-8B66-09F61F072BD4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", matchCriteriaId: "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", matchCriteriaId: "A216FA06-4E47-4105-8ADE-956F887AFC6B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", matchCriteriaId: "137DECAA-074A-4FEC-A633-FE3836E0D32B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", matchCriteriaId: "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", matchCriteriaId: "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", matchCriteriaId: "58157F24-D89E-4552-8CE6-2F01E98BD1E5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", matchCriteriaId: "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", matchCriteriaId: "328F854B-3716-47D9-BE70-765DE3689DAC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", matchCriteriaId: "D179F530-F642-444C-8184-3770FA8A338E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", matchCriteriaId: "CB237F89-7405-46F7-972E-81A3B78631BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", matchCriteriaId: "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", matchCriteriaId: "017FA232-935C-4096-8087-5F90147589C2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", matchCriteriaId: "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", matchCriteriaId: "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", matchCriteriaId: "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", matchCriteriaId: "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", matchCriteriaId: "B506523F-101E-4F05-82D5-31E37B8B2E8C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", matchCriteriaId: "1ED47811-5435-43D1-A57F-CA89807A6118", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", matchCriteriaId: "F6FB5695-2950-4CEC-81B4-FD280F835330", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", matchCriteriaId: "6799338F-C0F9-4B25-A14C-68C4158B01F6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", matchCriteriaId: "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", matchCriteriaId: "9F340AF8-508F-449D-9AFA-4E55F069B4F3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", matchCriteriaId: "E944410E-D674-4141-B50C-9F55090325FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", matchCriteriaId: "5461E4AD-2944-46A0-A696-FC32CD069D64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", matchCriteriaId: "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", matchCriteriaId: "E2A76E12-842B-4925-B5F5-53497C3E420F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", matchCriteriaId: "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", matchCriteriaId: "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", matchCriteriaId: "361C2658-F122-4AE9-B67D-4467F29E096D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", matchCriteriaId: "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", matchCriteriaId: "C47C2864-4B34-46DD-AABF-9F38B72578AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", matchCriteriaId: "77AFA400-C880-48AE-B32F-0AC8DF073CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", matchCriteriaId: "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*", matchCriteriaId: "55B1DB28-A0BE-40C5-BA4D-50354A085893", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*", matchCriteriaId: "47859796-AA68-4E49-A625-9CBB49E5967A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*", matchCriteriaId: "7FB51313-4B56-4045-A5A9-A2F2C1D21548", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*", matchCriteriaId: "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*", matchCriteriaId: "719CAF85-B1F1-4BF9-9217-6181339B20A2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*", matchCriteriaId: "F908E2B8-B4A1-487A-820D-57B1AC437754", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*", matchCriteriaId: "ACDAC96E-D749-47E0-8DE4-BA0C74027330", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*", matchCriteriaId: "461A6DF4-EC6D-4DC8-A474-B219AE372FA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*", matchCriteriaId: "60B23D94-D9F7-4EDE-9641-CE5670EB78C2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*", matchCriteriaId: "6F03C408-C457-4306-B26B-D21056B57AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*", matchCriteriaId: "2FB20448-852D-4B59-9517-DCF738140F79", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*", matchCriteriaId: "5D2A6907-9CE2-465C-89EA-F1B84B31768D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*", matchCriteriaId: "B3420C39-8177-445E-8501-49A4ED3998BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*", matchCriteriaId: "049D03CC-7D4A-4D64-A3F4-0138717433CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*", matchCriteriaId: "ACED82AA-7C7D-4089-9129-579CC6B063FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*", matchCriteriaId: "24761232-F2C3-421D-A6AB-6FC100FE9B1D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*", matchCriteriaId: "AAC00AAC-243D-437D-B613-1CF97CA58253", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*", matchCriteriaId: "832281CF-98D7-42FF-8CF1-97632F8F7834", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*", matchCriteriaId: "AE46D028-025E-4D37-9DF6-9BF385246923", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*", matchCriteriaId: "3462E847-5100-4C4E-AE79-81D2857280AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*", matchCriteriaId: "2F2D80BA-B6EE-451A-9D40-808B20E7B17A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*", matchCriteriaId: "A65D4242-CBA6-413D-846C-72772C96E14D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*", matchCriteriaId: "238B7D82-E552-46D5-9F66-1363F1610BD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*", matchCriteriaId: "6424D4A6-732D-4D4E-B099-E38FBFE1CF38", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*", matchCriteriaId: "177CA640-399E-4343-8DBB-E105E188CE3A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*", matchCriteriaId: "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*", matchCriteriaId: "8C43C5A6-31B6-4946-90DA-60BBBA03861D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*", matchCriteriaId: "CE15099D-6718-4AF8-BA3B-57DE1FE71289", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*", matchCriteriaId: "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*", matchCriteriaId: "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*", matchCriteriaId: "2B1BE9EE-4403-4983-89CD-A85C77846861", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*", matchCriteriaId: "D28279AE-D876-4692-A54B-01CCD57AB61D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*", matchCriteriaId: "E947FE61-02BA-46DB-AD95-692E33F74E6D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*", matchCriteriaId: "BD67AE51-56B8-473E-B5A3-89753D98481B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*", matchCriteriaId: "47FC1445-5032-4BF1-9A1E-AF078BAC7676", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*", matchCriteriaId: "84181B90-DEEB-4291-86F7-7C65B51FBBEE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*", matchCriteriaId: "5A72734A-69D0-4FD8-95E8-997BC06B9676", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*", matchCriteriaId: "92C1C2B4-0431-48B9-AEA9-F6925268DE92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*", matchCriteriaId: "A15B8BA9-3C75-492F-8105-C5F563653A1C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*", matchCriteriaId: "D670832E-8CB5-4861-8001-2E317CE7526C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*", matchCriteriaId: "05DEAC21-5D6B-4224-BC50-54368CD9ECA7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*", matchCriteriaId: "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*", matchCriteriaId: "6213C0D4-B0F4-4156-A467-4F29FA0E6093", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*", matchCriteriaId: "4288A260-F478-46A2-B18D-BD9CD797FE5B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*", matchCriteriaId: "159865EE-8852-4CBE-A3E3-D97C0D9CD89A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*", matchCriteriaId: "1479FE1F-882C-4EA3-A05B-B5901D14D9A5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*", matchCriteriaId: "BD701852-1959-429B-A631-2FE8390FFA31", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*", matchCriteriaId: "F687C73A-35F2-45A2-91E6-A43DCFAD463F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*", matchCriteriaId: "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*", matchCriteriaId: "02D3D433-30D2-4EBB-869A-79BB4B0AA879", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*", matchCriteriaId: "D4701873-F7AA-40B8-AFD9-4A60D118574E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", matchCriteriaId: "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", matchCriteriaId: "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", matchCriteriaId: "A0E91F46-D950-4894-BACF-05A70C7C6F7B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", matchCriteriaId: "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", matchCriteriaId: "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", matchCriteriaId: "D06639F5-5EE8-44F4-B48A-5694383154DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", matchCriteriaId: "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", matchCriteriaId: "637C3687-FBCC-41A0-BFE6-823BAE45FB92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", matchCriteriaId: "2350A197-193F-4B22-80E8-3275C97C78EE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", matchCriteriaId: "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", matchCriteriaId: "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", matchCriteriaId: "99019EA0-6576-4CE7-B60A-975D418AA917", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", matchCriteriaId: "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", matchCriteriaId: "EB9DD909-B2AC-46BA-B057-D239D0773CAD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", matchCriteriaId: "54F5C355-FDFC-4E71-93AA-218389EF10E6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", matchCriteriaId: "B0A1CA1E-971D-4F67-864E-2E772C1E736B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", matchCriteriaId: "1B5F8391-D974-49AC-8550-ADB3FA6C0535", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", matchCriteriaId: "8302BF58-9E54-40DA-BCFE-59CA52C460D9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", matchCriteriaId: "ECCDE9EF-037B-4650-8131-4D57BE141277", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", matchCriteriaId: "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", matchCriteriaId: "DB8253DA-9A04-40D6-84C1-C682B4023D4B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", matchCriteriaId: "DAF6D175-85C3-4C72-AD9F-31B47EF43154", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", matchCriteriaId: "7A5FC594-2092-4240-9538-235BBE236DD9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", matchCriteriaId: "87D95F00-EA89-4FDE-991C-56636B8E0331", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", matchCriteriaId: "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", matchCriteriaId: "4158561F-8270-42D1-91D8-E063CE7F5505", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", matchCriteriaId: "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", matchCriteriaId: "F8BACE1C-5D66-4FBC-8F86-30215A623A94", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", matchCriteriaId: "CF707146-0D64-4F3A-AE22-956EA1CB32B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", matchCriteriaId: "8118C3F9-0853-4E87-9E65-86E1398B2780", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", matchCriteriaId: "1A298501-C4D7-48D4-90F9-15AFA59DED48", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", matchCriteriaId: "FEE1B07B-3D92-4D2D-8667-D902F002277F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", matchCriteriaId: "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", matchCriteriaId: "5588732F-7F1A-4C24-B35F-30532107FFDE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", matchCriteriaId: "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", matchCriteriaId: "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", matchCriteriaId: "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", matchCriteriaId: "813965F4-3BDA-4478-8E6A-0FD52723B764", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", matchCriteriaId: "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", matchCriteriaId: "04384319-EE8C-45B4-8BDD-414502E7C02D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", matchCriteriaId: "C52528CE-4F31-4E5F-8255-E576B20F3043", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", matchCriteriaId: "A6C3F422-F865-4160-AA24-1DAFAE63729C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", matchCriteriaId: "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", matchCriteriaId: "3C18E6B4-E947-403B-80FB-7095420D482B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", matchCriteriaId: "2814CC9F-E027-4C5A-93AF-84EA445E6C12", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", matchCriteriaId: "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", matchCriteriaId: "A1236944-4942-40E4-9BA1-029FEAE94BBC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", matchCriteriaId: "086CAB4B-A10A-4165-BC33-33CADCD23C0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", matchCriteriaId: "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", matchCriteriaId: "AAFB6B30-BFB0-4397-9E16-37D1A772E639", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", matchCriteriaId: "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", matchCriteriaId: "64277594-9713-436B-8056-542CFA9F4CFC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", matchCriteriaId: "589BB170-7CBA-4F28-99E3-9242B62E2918", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", matchCriteriaId: "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", matchCriteriaId: "54464F6C-9B2D-46BA-AC44-506389F3EE0C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", matchCriteriaId: "8FA11017-EA58-45EE-8408-FCCCF7183643", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", matchCriteriaId: "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", matchCriteriaId: "442AD778-D56F-4C30-BBF8-749D6AAC4737", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", matchCriteriaId: "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", matchCriteriaId: "445BFC2E-38FA-4130-8550-0866EC4EDA33", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", matchCriteriaId: "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", matchCriteriaId: "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", matchCriteriaId: "0C8535E6-220E-4747-8992-45B6EAFC555C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", matchCriteriaId: "C7479B49-F484-4DF2-86CB-E52EE89FA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", matchCriteriaId: "B6D68512-746D-4E95-857B-13A0B6313C5E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", matchCriteriaId: "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", matchCriteriaId: "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", matchCriteriaId: "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", matchCriteriaId: "2AB02172-B9A7-4801-88F2-98BF5843184A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", matchCriteriaId: "5141380E-BD18-47C1-A84C-384BA821773D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", matchCriteriaId: "1AE6C49E-2359-4E44-9979-7D34F8460E35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", matchCriteriaId: "C004B75F-37AF-4E61-98F3-1B09A7062DDB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", matchCriteriaId: "F7126D19-C6D9-43CB-8809-647B1A20E7DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", matchCriteriaId: "9CC98503-A80A-4114-8BF2-E016659BE84E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", matchCriteriaId: "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", matchCriteriaId: "3821412D-B010-49C4-A7B4-6C5FB6C603B1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", matchCriteriaId: "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", matchCriteriaId: "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", matchCriteriaId: "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", matchCriteriaId: "F96C6CA0-434D-428F-B629-A971C2937628", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", matchCriteriaId: "301AB72A-A6F2-42C8-A931-94EF2271443F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", matchCriteriaId: "59414B5A-05B8-49AF-A197-2A31729DDB65", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", matchCriteriaId: "0BFDD380-692F-41D7-996F-F97FC74DC7CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", matchCriteriaId: "49602828-2BFC-4571-9F05-6210FD263DF2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", matchCriteriaId: "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", matchCriteriaId: "03096A9A-5758-47E6-81E2-BCFE847C41F4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", matchCriteriaId: "150CC865-7975-45EC-BFF7-A94146442BA8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", matchCriteriaId: "C8FA1308-589B-432B-80F9-9A499D083ED5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", matchCriteriaId: "6ED2453E-30E1-4620-BEC5-21B0083449E2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", matchCriteriaId: "0FE8DD05-D700-4F89-9B01-D489029DF7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", matchCriteriaId: "050957CA-6191-4F9F-9D07-48B342B3B1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", matchCriteriaId: "DACBF998-8B11-45C7-9017-486AED4FAE6C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", matchCriteriaId: "C9F2F3C4-FC94-414A-A208-913A43D57D75", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", matchCriteriaId: "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", matchCriteriaId: "4911E332-B8BA-4336-A448-3F70D2BBB147", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", matchCriteriaId: "330EC403-3174-4543-9BBE-CEC0ABC1575D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", matchCriteriaId: "5EF585D0-507E-491E-9C3B-78EE26F2F070", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", matchCriteriaId: "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", matchCriteriaId: "1F5D885A-85C4-4A11-B061-61EFF6B6E329", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", matchCriteriaId: "0502B59F-933C-4E25-A2EC-9296B197E139", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", matchCriteriaId: "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", matchCriteriaId: "B5A1BAEC-18BF-4607-BFB7-48102E75186A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", matchCriteriaId: "D49ED138-F42D-4451-A350-0B2DD5AB9444", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", matchCriteriaId: "5ED91472-90FC-4AC8-96D5-1550A8502411", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", matchCriteriaId: "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", matchCriteriaId: "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", matchCriteriaId: "2784E2AF-A5E5-4960-830C-B3EFB84043D0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", matchCriteriaId: "9112FA50-5527-4B20-80F5-2DE9E66D09F6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", matchCriteriaId: "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", matchCriteriaId: "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", matchCriteriaId: "BCA05A18-1523-4EED-9D2E-0A258A33F24F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", matchCriteriaId: "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", matchCriteriaId: "78D301F1-20C2-4756-9A90-37F14835CE14", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", matchCriteriaId: "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", matchCriteriaId: "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", matchCriteriaId: "129DB9CB-E878-4856-A954-15FFE1428636", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", matchCriteriaId: "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", matchCriteriaId: "07E86978-4820-422A-8C7C-FF0697DAED05", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", matchCriteriaId: "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*", matchCriteriaId: "77447A8E-7EAA-47A2-BA7A-434F7111693B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", matchCriteriaId: "04A65469-083F-40B5-86C5-A2EAE5B2F00A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", matchCriteriaId: "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", matchCriteriaId: "B71A6DB0-5EB0-4712-8480-CF427F521D33", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", matchCriteriaId: "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", matchCriteriaId: "4DD69605-F52B-4623-921A-983A5A408ECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", matchCriteriaId: "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", matchCriteriaId: "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", matchCriteriaId: "3832D0A6-419D-4876-B5C4-920578F713F3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", matchCriteriaId: "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", matchCriteriaId: "404E38E6-9EB3-41D0-97A7-DC579688BFB0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", matchCriteriaId: "40E4A921-AB28-47B7-B5A3-EB82193D15BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", matchCriteriaId: "B0357E48-2300-47B4-B9E5-9FE813A2FC09", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", matchCriteriaId: "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", matchCriteriaId: "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", matchCriteriaId: "E0387587-AAB6-4284-8516-4DA3E3582D30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", matchCriteriaId: "A238C975-9196-449F-9C15-ABB2E9FD1D06", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", matchCriteriaId: "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", matchCriteriaId: "2537F047-64C9-4E73-B82C-310253184183", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", matchCriteriaId: "3A55857C-649D-46CE-AEDA-6E553E554FC1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", matchCriteriaId: "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", matchCriteriaId: "327E06A3-7F0E-4498-8811-10C8D15398FE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", matchCriteriaId: "1624E6D6-858E-4085-B0B9-362B819EFD88", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", matchCriteriaId: "50D61F4A-40F0-477C-8326-7359D3626E77", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", matchCriteriaId: "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", matchCriteriaId: "5B215788-860B-46CD-9A08-43AFF98FAEAA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", matchCriteriaId: "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", matchCriteriaId: "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", matchCriteriaId: "5C4815AE-B635-4545-83C2-5EC4E0128337", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", matchCriteriaId: "C0046C06-E3E6-4674-A4D1-332DD29D9552", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", matchCriteriaId: "2C191851-3DC3-41C7-AD89-81F091CCC83A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", matchCriteriaId: "21126922-8E81-47F4-82D4-CBCDDACEC4FA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", matchCriteriaId: "209E18B0-BBB5-4C65-B336-44340F7740DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", matchCriteriaId: "C867C0B8-91A4-482A-B7DD-54AB9599AE52", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", matchCriteriaId: "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", matchCriteriaId: "09854948-2657-4261-A32A-0523058F072E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", matchCriteriaId: "D13904A5-266D-481C-A42A-734C3823A238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", matchCriteriaId: "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", matchCriteriaId: "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", matchCriteriaId: "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", matchCriteriaId: "501E9355-0CDD-4951-BCC3-47962788BCCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", matchCriteriaId: "B3D976D9-62F0-43C3-8359-E51E26B6CD87", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", matchCriteriaId: "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", matchCriteriaId: "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", matchCriteriaId: "C90CCA48-1705-4564-AAF9-271201BD5113", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", matchCriteriaId: "0B82BAFF-17F5-465C-8032-67D5ECAB2921", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", matchCriteriaId: "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", matchCriteriaId: "F831371E-7437-48D7-8281-1F406215041B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", matchCriteriaId: "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", matchCriteriaId: "92AF503A-A2B1-4FC3-858B-264049ADF0F8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", matchCriteriaId: "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", matchCriteriaId: "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", matchCriteriaId: "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", matchCriteriaId: "F9849BA3-3990-4E30-B99B-ADD043314CDA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", matchCriteriaId: "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", matchCriteriaId: "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", matchCriteriaId: "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", matchCriteriaId: "D7FA2911-6561-47BF-BEE8-DDA31642C346", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", matchCriteriaId: "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", matchCriteriaId: "0F829DED-4D92-401A-BD80-C070DE57FC7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", matchCriteriaId: "F560575C-FD8E-485D-B50A-572604BBE903", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", matchCriteriaId: "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", matchCriteriaId: "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", matchCriteriaId: "381EFC43-D5D9-4D10-90BE-4C333A9BA074", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", matchCriteriaId: "CBEDED18-2755-4C55-A1A1-04B4D5F40276", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", matchCriteriaId: "F04B57EC-0731-40C8-939F-1C686A65A0FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", matchCriteriaId: "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", matchCriteriaId: "CE1D28F9-B135-441B-A9BF-792DD356E374", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", matchCriteriaId: "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", matchCriteriaId: "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", matchCriteriaId: "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", matchCriteriaId: "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", matchCriteriaId: "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", matchCriteriaId: "707F6671-57AC-4DF4-8024-444502E5C92E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", matchCriteriaId: "3C1FCE07-F9E8-4B14-95CE-01784D472128", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", matchCriteriaId: "C208711F-FC06-46C8-8849-27054DC1B264", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", matchCriteriaId: "25AB8041-F201-4BB3-AAD9-199B06697DF3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", matchCriteriaId: "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", matchCriteriaId: "1F566CD3-3649-492B-B0AB-A107E51675B9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", matchCriteriaId: "BB9F3D74-AE72-4FC5-83E9-890781AF3093", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", matchCriteriaId: "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", matchCriteriaId: "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", matchCriteriaId: "C69918C6-7AAD-4AA5-AB72-C275367B1008", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", matchCriteriaId: "06155B0B-A5AD-4A82-8C02-D264981687A6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", matchCriteriaId: "F76C19A4-FA26-432A-9443-9F92B2A946EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", matchCriteriaId: "99BEE9BE-E49A-489B-B333-95D0993F8FA3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", matchCriteriaId: "7427A678-EC47-4030-B905-619DD95F5A82", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", matchCriteriaId: "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", matchCriteriaId: "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", matchCriteriaId: "A8424463-C329-4BAA-8AA1-25CD8B63292E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", matchCriteriaId: "52727E62-0048-4C56-BC8C-B3450D257B21", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", matchCriteriaId: "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", matchCriteriaId: "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", matchCriteriaId: "F6421F69-1076-43D2-B273-DE80FB2D5F72", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", matchCriteriaId: "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", matchCriteriaId: "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", matchCriteriaId: "7E611EDD-D44C-4311-B681-431D7C574528", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", matchCriteriaId: "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", matchCriteriaId: "1886D007-85B6-4E5A-968D-A1FD476A08A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", matchCriteriaId: "BDDDCB65-4404-49BC-9515-ECECD58A667F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", matchCriteriaId: "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*", matchCriteriaId: "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*", matchCriteriaId: "777E076D-285A-4CA5-8886-080BD505DB42", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*", matchCriteriaId: "4FC42173-AD0A-40F4-8ECC-17B815F047B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*", matchCriteriaId: "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*", matchCriteriaId: "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*", matchCriteriaId: "F8CE80B4-02EE-4CF5-B944-860AB16BADC6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*", matchCriteriaId: "BACC17D3-E255-4CCD-86BD-AADC9EC48E80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "13878C13-1C7C-4B83-AF27-4998E8F659DC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", matchCriteriaId: "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", matchCriteriaId: "2F9AC992-59B7-44EE-9FF3-567AC48938AA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", matchCriteriaId: "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", matchCriteriaId: "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", matchCriteriaId: "CC1BA7AC-989B-4093-841A-C6D5978BF17F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", matchCriteriaId: "1874F848-B15B-4369-A164-5FA11D2B9AFE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", matchCriteriaId: "9E46F934-9765-43ED-88A7-A4778C99A976", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", matchCriteriaId: "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", matchCriteriaId: "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", matchCriteriaId: "B206674F-1A34-470B-820C-05F9C37792CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", matchCriteriaId: "63AE2051-9F8E-4477-8E1E-38A1E06AD247", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", matchCriteriaId: "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", matchCriteriaId: "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", matchCriteriaId: "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", matchCriteriaId: "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", matchCriteriaId: "E95A34F0-0B74-4031-BC9E-CBC93665BE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", matchCriteriaId: "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", matchCriteriaId: "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", matchCriteriaId: "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", matchCriteriaId: "758E45B6-7C7A-432D-891D-CB99077AE3B5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", matchCriteriaId: "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", matchCriteriaId: "26D7A401-BCE1-4673-93C9-67F009B75A39", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", matchCriteriaId: "6E62119B-2A65-4473-B570-F118614B0ED6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", matchCriteriaId: "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", matchCriteriaId: "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", matchCriteriaId: "91BE6238-312E-4CF7-9E74-48CB5603B0FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", matchCriteriaId: "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", matchCriteriaId: "33BA1BE0-0A78-4E94-A619-35735C913180", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", matchCriteriaId: "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", matchCriteriaId: "24CA40FE-80C5-4A20-8219-CEF51F3162FD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", matchCriteriaId: "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", matchCriteriaId: "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", matchCriteriaId: "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", matchCriteriaId: "8CB2949C-4699-49EF-83EB-31199E0CE2DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", matchCriteriaId: "66C169DC-EEFE-4DE6-A3D0-65B606527240", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", matchCriteriaId: "FD28227A-8888-43B2-BC41-8D54B49DA58C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", matchCriteriaId: "7984BAEA-4518-4E17-830E-B34D09648BD8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", matchCriteriaId: "2C2214E5-491E-448F-A4B6-A497FB44D722", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", matchCriteriaId: "2AE93013-C262-46A5-8E77-D647881EE632", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", matchCriteriaId: "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", matchCriteriaId: "EEAC04A3-EBE3-406B-B784-A3547162ECE4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", matchCriteriaId: "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", matchCriteriaId: "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", matchCriteriaId: "5AE30903-4F75-4D71-A8BB-44D1099E9837", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", matchCriteriaId: "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", matchCriteriaId: "DB8CF348-811C-4342-ACB9-AFCABCC34331", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", matchCriteriaId: "71998EC5-EC0F-496C-B658-3CD91D824944", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", matchCriteriaId: "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", matchCriteriaId: "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", matchCriteriaId: "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", matchCriteriaId: "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", matchCriteriaId: "F699569F-4F52-4CC0-90D9-CC4CBC32428A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", matchCriteriaId: "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", matchCriteriaId: "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", matchCriteriaId: "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", matchCriteriaId: "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50", versionEndIncluding: "11.22.70", versionStartIncluding: "3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", matchCriteriaId: "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", matchCriteriaId: "580DF3D2-C365-43AF-9A48-F173072AA40B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", matchCriteriaId: "32AD0A43-28BF-48F4-B363-F7A3A1BFE296", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", matchCriteriaId: "9A747F9D-9761-4B8E-B01C-42018B25245A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", matchCriteriaId: "DDA4CA91-DA96-4466-8969-3570C8E4343A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", matchCriteriaId: "ECF29446-F253-438C-B1EA-B606186855FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", matchCriteriaId: "C08277EA-676A-4D45-B66D-2488308CDEEB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*", matchCriteriaId: "994C51C8-AD87-4CDB-8EBD-4488D7604BA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.", }, { lang: "es", value: "Desbordamiento de búfer en el manipulador HTTP en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x y 11.x podría permitir que un atacante ejecute código arbitrario mediante la misma subred.", }, ], id: "CVE-2018-3628", lastModified: "2024-11-21T04:05:47.820", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-10T21:29:00.857", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041362", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041362", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190327-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15", versionEndExcluding: "11.8.70", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", versionEndExcluding: "11.11.70", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43", versionEndExcluding: "11.22.70", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853", versionEndExcluding: "12.0.45", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.", }, { lang: "es", value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una denegación de servicio o una divulgación de información por medio de un acceso adyacente.", }, ], id: "CVE-2019-0131", lastModified: "2024-11-21T04:16:18.103", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.8, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-18T22:15:11.533", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-05 19:29
Modified
2024-11-21 03:28
Severity ?
Summary
Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | active_management_technology_firmware | 11.0.25.3001 | |
intel | active_management_technology_firmware | 11.0.26.3000 | |
intel | manageability_engine_firmware | 11.0.25.3001 | |
intel | manageability_engine_firmware | 11.0.26.3000 | |
intel | small_business_technology_firmware | 11.0.25.3001 | |
intel | small_business_technology_firmware | 11.0.26.3000 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:11.0.25.3001:*:*:*:*:*:*:*", matchCriteriaId: "C58BB0F4-0CC8-4117-9FBD-842F1A2629A7", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:11.0.26.3000:*:*:*:*:*:*:*", matchCriteriaId: "EDA1C111-F4A6-4191-A649-83B8D7E87920", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.0.25.3001:*:*:*:*:*:*:*", matchCriteriaId: "88A6B19B-50BD-4EFE-A707-F3557D05D816", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.0.26.3000:*:*:*:*:*:*:*", matchCriteriaId: "6E412DFA-8C90-4C8C-A281-00A344AEF0FE", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:small_business_technology_firmware:11.0.25.3001:*:*:*:*:*:*:*", matchCriteriaId: "E975987A-24AC-43B2-8E8D-FCAFF2DFABAC", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:small_business_technology_firmware:11.0.26.3000:*:*:*:*:*:*:*", matchCriteriaId: "CF3F2A41-56E9-4648-94B8-FBDFCA43B3D1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.", }, { lang: "es", value: "El sistema anti-rollback de Intel Active Management Technology, Intel Standard Manageability e Intel Small Business Technology en sus versiones 11.0.25.3001 y 11.0.26.3000 no evita que se actualice el firmware a la versión 11.6.x.1xxx, la cual es vulnerable a CVE-2017-5689. Esto puede llevarlo a cabo un usuario local con privilegios de administrador.", }, ], id: "CVE-2017-5698", lastModified: "2024-11-21T03:28:14.687", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.9, confidentialityImpact: "NONE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:N/I:C/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-05T19:29:00.217", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-08-18 21:15
Modified
2024-11-21 06:57
Severity ?
Summary
Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | standard_manageability | * | |
intel | active_management_technology_firmware | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "5FA8EEF7-DACD-45B8-92A2-CE363D4EDE23", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F802F5D5-BAF0-4246-BEAD-9227BF50EE88", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.", }, { lang: "es", value: "Un control de acceso inapropiado en el firmware para Intel(R) AMT e Intel(R) Standard Manageability puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios por medio del acceso físico.", }, ], id: "CVE-2022-28697", lastModified: "2024-11-21T06:57:45.567", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-08-18T21:15:08.467", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, { source: "secure@intel.com", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221014-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.", }, { lang: "es", value: "Una comprobación de entrada inapropiada en el subsistema para Intel® AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una denegación de servicio por medio de un acceso de red", }, ], id: "CVE-2020-0538", lastModified: "2024-11-21T04:53:41.830", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:10.910", references: [ { source: "secure@intel.com", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "1B273234-6A62-430D-AF97-DAE65C7B16EB", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "20684D0C-F699-4315-BB60-AAFA5E12D08A", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "68AA7FEC-EDAB-408D-B9E3-5DECD205186E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "2C01525A-E5F1-4F2A-B561-11874BAB7EA1", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "85F881D8-37D0-4391-8F95-71A70A4843B0", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Una lectura fuera de límites en el subsistema DHCP para Intel® AMT, Intel® ISM versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información por medio de un acceso de red", }, ], id: "CVE-2020-8753", lastModified: "2024-11-21T05:39:22.920", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:17.830", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15", versionEndExcluding: "11.8.70", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", versionEndExcluding: "11.11.70", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43", versionEndExcluding: "11.22.70", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853", versionEndExcluding: "12.0.45", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.", }, { lang: "es", value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso físico.", }, ], id: "CVE-2019-11100", lastModified: "2024-11-21T04:20:32.197", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "NONE", baseScore: 4.6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 0.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-18T22:15:12.410", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.", }, { lang: "es", value: "Una lectura fuera de límites en el subsistema para Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local", }, ], id: "CVE-2020-8757", lastModified: "2024-11-21T05:39:23.303", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:18.127", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Severity ?
Summary
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCE880E2-5E1F-40F5-AD2F-A266A95C51B6", versionEndIncluding: "8.1.71.3608", versionStartIncluding: "8.0.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "139DA53F-A603-490F-A4E5-44D7A0071CDC", versionEndIncluding: "9.1.41.3024", versionStartIncluding: "9.0.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BFA876A3-88C1-43D8-92E0-B21E16D37736", versionEndIncluding: "10.0.55.3000", versionStartIncluding: "10.0.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.0:*:*:*:*:*:*:*", matchCriteriaId: "411DC559-E8A9-4BC4-96C6-EA753E54543E", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.5:*:*:*:*:*:*:*", matchCriteriaId: "559DF7F6-F649-4C57-893A-6775F07C31A5", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.6:*:*:*:*:*:*:*", matchCriteriaId: "2380C5D8-8A58-4279-A3D9-7234C7B1D668", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.7:*:*:*:*:*:*:*", matchCriteriaId: "39EB2D65-90F2-4866-A886-F64DB9C7D2FA", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.10:*:*:*:*:*:*:*", matchCriteriaId: "69EF0C50-F104-47CE-89E7-BC37FE1A5717", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.20:*:*:*:*:*:*:*", matchCriteriaId: "3D764C7C-2C49-4149-9586-5D0140CE00FF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2F41472A-BC3D-4226-88AC-975E523C3678", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-premium_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B0AEFB41-300D-4541-90EC-6F736A06A404", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-premium:-:*:*:*:*:*:*:*", matchCriteriaId: "54563F87-598C-4301-95C5-A582A78E3D64", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-deluxe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF442E72-096E-40C0-9258-3E2474545E2C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-deluxe:-:*:*:*:*:*:*:*", matchCriteriaId: "54781F85-88B1-488F-A33F-442947CDA125", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1EEE05D-D9C8-44C0-A8BD-D6A262A79CF0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "9606205C-88D0-44BB-8052-1E78C512DEB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EDE25BF7-37DE-4F90-81FD-D95A2A3031BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-a:-:*:*:*:*:*:*:*", matchCriteriaId: "95C71F90-C6E8-49D8-AC7E-1BC2FF49BFA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-ar_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37A4CC55-E868-4174-8FC1-23FBF75A973F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-ar:-:*:*:*:*:*:*:*", matchCriteriaId: "6C9CE58F-3A49-41B8-B9EC-F901AB83D861", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "277B4C76-D04F-467B-8367-E51F74E21ABE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-e:-:*:*:*:*:*:*:*", matchCriteriaId: "82DC9901-B4D7-4FD6-86BB-B75FF30CB11A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-k_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6701855F-2D7F-4559-A8D1-CF8A8C999B91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-k:-:*:*:*:*:*:*:*", matchCriteriaId: "E66B1596-8BAA-4805-8D49-9C42E270B219", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1F7656-9A1F-409C-BA46-BD1B979C25F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-p:-:*:*:*:*:*:*:*", matchCriteriaId: "2D7EB86B-7BC7-4D34-9EDE-04564FEFEDAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B2357072-5ED5-4DC9-BF2A-AE6F85C6C240", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "FCC3417D-44A9-489F-A440-8D3E75DD3586", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01833F6B-F38D-439A-B84A-047DBC75F71F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170m-plus\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "89756DDE-8EA9-4135-BBA8-0707FE3D81B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170-p_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1249DEA2-CEF8-4009-B6BF-E0DCA5032B75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170-p_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "4B7D4616-0DCA-4168-8CF4-7055AA922E2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170m-e_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57BB2B24-1B03-46DE-B4F9-CCDDD83FA28C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170m-e_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "F309D3DC-E2C2-406C-B742-71CAD9E4A568", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:sabertooth_z170_mark_1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D42A2157-8724-4CF2-88F0-048231320354", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:sabertooth_z170_mark_1:-:*:*:*:*:*:*:*", matchCriteriaId: "283B693A-D720-411C-96C9-91E356A97FD5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:sabertooth_z170_s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7868F0B3-ED86-4C00-A227-CFD8A14A0790", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:sabertooth_z170_s:-:*:*:*:*:*:*:*", matchCriteriaId: "45195F20-5E26-426A-A272-5B6342BD06C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_extreme_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A77678DA-7926-4688-BFC6-9C989985C633", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_extreme:-:*:*:*:*:*:*:*", matchCriteriaId: "7C33821F-3755-4301-B808-806F918FF06F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_ranger_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CE0AF7AF-0416-4E40-9F18-74B89E0E0F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_ranger:-:*:*:*:*:*:*:*", matchCriteriaId: "0BD49CDD-10C4-4795-BCEF-132FDB6A25CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_formula_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1763A28F-2ED5-4309-9C02-0587DD2435CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_formula:-:*:*:*:*:*:*:*", matchCriteriaId: "334D6552-C4E3-4F13-ACD1-3BE6312E9FEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_hero_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABF49D87-4566-404D-908D-3C5A02B0BE7F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_hero:-:*:*:*:*:*:*:*", matchCriteriaId: "EFCE5FB6-2F8D-4707-BE1E-26DE66C7740A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_hero_alpha_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13578BDF-A38D-4357-AD35-41BA988E286B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_hero_alpha:-:*:*:*:*:*:*:*", matchCriteriaId: "F716322D-6778-45FD-A4F0-A773A28EA3F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_gene_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D318FB-16E1-4B5D-817A-2A13DF88A1D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_gene:-:*:*:*:*:*:*:*", matchCriteriaId: "E968C4AB-61B0-435C-BAC5-A70EC78EAD5F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_viii_impact_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "054E1398-AE98-46AB-B7A6-703F342CC847", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_viii_impact:-:*:*:*:*:*:*:*", matchCriteriaId: "8C5667A1-AFB2-4ABF-B9C8-CB24EBFF16C4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170i_pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0BC1CDA2-B140-45FE-8FE5-2FAC5B3907E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170i_pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "9E8DCBFE-9482-40F6-9C8F-E4A472767FED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170_pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A02FA657-FC01-4795-8246-B777A7A5BCAB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170_pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "23E5CBA9-E946-4F22-A0E9-40A63380E260", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:z170_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F814D5CE-2F35-4631-BC6C-857CBBD9DC72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:z170_pro_gaming\\/aura:-:*:*:*:*:*:*:*", matchCriteriaId: "5E3FF12D-3EA0-4738-9B36-ED5461C9D0C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150_pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3BE8D64-A47B-4412-AF8A-354D01DB719C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150_pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "F273293C-6EDA-485E-AA38-A4FE41822171", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77C23914-2AB4-4D6F-A438-F1762F235D92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150_pro_gaming\\/aura:-:*:*:*:*:*:*:*", matchCriteriaId: "22CB8991-762A-46B5-8759-AF453E21FD95", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150i_pro_gaming\\/wifi\\/aura_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3ED630E-C695-47DD-AABA-39603766CE2A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150i_pro_gaming\\/wifi\\/aura:-:*:*:*:*:*:*:*", matchCriteriaId: "6B17C450-C8E8-4255-8E23-4ABBC8664366", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150i_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C7800E86-9FAF-4D42-8029-97A22AF87E20", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150i_pro_gaming\\/aura:-:*:*:*:*:*:*:*", matchCriteriaId: "FF81798D-F241-499D-84BC-AE647D7DA06A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m_pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "552BBFAA-A268-4DF9-AC1B-9A99FD5BAA83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m_pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "CBBDF56E-375F-439E-A1A7-1D94523C6DF7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A06F70FB-E259-4957-9D86-88805F8C0753", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-a:-:*:*:*:*:*:*:*", matchCriteriaId: "91597904-8647-4109-864D-5EC577A22C55", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-a_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E32C912D-CF86-4A1B-B440-E61B3B24886C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-a_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "0232EA20-A6BB-4CC9-88FE-F91BE7EFFCFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-c_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3B8A7AC-953B-4CEE-8DF5-6B5787918CC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-c_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "B266B9C5-DB7D-41B4-BD43-F50A45B8688C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "109745AA-5210-49EE-93E2-2660FE605273", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3990C807-1EA1-42FD-9C38-7B28E99B9630", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AAFDA852-209E-49BB-9793-F2E26FAE785F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-d:-:*:*:*:*:*:*:*", matchCriteriaId: "60AB4DAC-E806-4772-96C8-F7C68930AA24", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-k_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED6011C6-C8CC-426A-BBB3-AA2698A191DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-k:-:*:*:*:*:*:*:*", matchCriteriaId: "AE6C34D6-D42F-4FA3-A9A3-985F6F49704A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "638CA839-0DB1-4F26-AC1F-3B65BB2DA0C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "75E4F53F-65C2-4254-AB16-51EB04CF10DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-f_plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F0F3C11-8700-4472-ADD5-462EAC571A5D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-f_plus:-:*:*:*:*:*:*:*", matchCriteriaId: "6381EE22-DFF3-4197-96C6-1B448D6AC9C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2BC083C-2DD2-40C5-9B5F-6CB524FD71DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "2DC8BB48-0826-45F6-B5E5-06FB66995E69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-v_plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "82068A08-B5D9-4A79-B81E-2249543175D8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-v_plus:-:*:*:*:*:*:*:*", matchCriteriaId: "723BF580-21B0-4FD4-8F43-F609AFD53B0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b150m-v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C81507B7-3C02-4AA4-B9E3-4F1DF9E9465A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b150m-v:-:*:*:*:*:*:*:*", matchCriteriaId: "A94BE221-3E91-492F-9BCB-2538B6812400", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b150m-v3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72FD9041-A1BF-4483-B9C2-70F8AB00C162", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b150m-v3:-:*:*:*:*:*:*:*", matchCriteriaId: "7A763DB3-F4AB-4696-B49B-9EC929E4B17A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b150m-v5_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30B7BF90-6D37-4211-9AC5-27F82D6DAE46", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b150m-v5:-:*:*:*:*:*:*:*", matchCriteriaId: "9D3A85B3-0576-4D31-A088-EBBEF429B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b150-v7_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8D7220B-8CF7-459E-9C93-FE2ED3AACC5B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b150-v7:-:*:*:*:*:*:*:*", matchCriteriaId: "D65B38A3-43EE-4EF8-AC46-8725EB3B4E69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23C4E73F-2B93-4CAE-ABDB-AF1C6C3E1763", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "42F37D51-6D2D-4325-BB0D-3FE2D5D1F2C3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BBF463BA-68F0-46C5-A948-EA233A7B493E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-a\\/m.2:-:*:*:*:*:*:*:*", matchCriteriaId: "10021E63-ED8B-4C5D-9559-93DA26469611", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B91F6BEA-C713-4394-A894-AC40053E4FD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-c:-:*:*:*:*:*:*:*", matchCriteriaId: "3202BBE4-8BC9-4266-89E1-02EC58034284", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-c\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "09432C60-8EC9-4FF9-9633-FF8779A5F9B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-c\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "49991ED2-1D79-4148-8F05-DE224ADC5181", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:pio-b150m_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30643353-C9AC-494F-B34D-4226042910CF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:pio-b150m:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B96870-A832-46FF-AF3F-169C486464B4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:trooper_b150_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "820B589F-9D3E-4D9C-8112-C11E28F9271E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:trooper_b150_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "8645FCEC-625F-4540-843D-CB56FBFABDBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-plus_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BBF89B32-1A7C-4BDA-9A45-1FFC1F38DE29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-plus_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "0EE36CBA-3C04-463E-A21A-1F489D755896", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150_pro_gaming_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6625FD9F-41FA-450E-9CD0-AC8C237C4D4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150_pro_gaming_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "21888815-D392-4E6D-A831-F2C170E4BE8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150m-k_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27B7FD9B-4FD1-4B60-8394-F51A8446D901", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150m-k_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "72749164-D3A3-4F10-80FC-331FB6705899", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b150-pro_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC24FA1-BB23-4FB3-A35B-6BD05BA45EC9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b150-pro_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "8CFFAE60-468F-4861-AED3-76EAF9676E19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-h110m-v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8ADE34C-4A5E-49CA-83CB-119703C5C2B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-h110m-v:-:*:*:*:*:*:*:*", matchCriteriaId: "3DFC293D-73DA-4048-A89D-92092D7BE42E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-h110m-v3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C5847BEF-CD8B-4B2C-A015-847CE9611EB0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-h110m-v3:-:*:*:*:*:*:*:*", matchCriteriaId: "AF1D362C-359D-455E-BBEF-9B77838419B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110i-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "16B21217-FC88-4AA0-A4AA-49E98A30122C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110i-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "E18DCD2A-3F80-461A-A04D-7BF084438E07", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-a\\/dp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2A70E8F-6058-4776-85D7-7FBA0D6B33B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-a\\/dp:-:*:*:*:*:*:*:*", matchCriteriaId: "14544DF1-2E6E-4A8B-9B86-2E10B5FE4282", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9229F19B-E8A3-44A0-862C-BE7DE7264018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c:-:*:*:*:*:*:*:*", matchCriteriaId: "49098E76-F811-451A-8D7F-1B40491A2278", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE58681-7681-4729-A9AC-FB1317FE1168", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "59B400E0-1526-4C46-A60D-84D468B1911E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c\\/hdmi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1204092-3B5B-4243-A0F6-B16C5C661F77", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c\\/hdmi:-:*:*:*:*:*:*:*", matchCriteriaId: "E71E3A13-644B-491C-97AA-688DA9214561", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c\\/ps_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6F8AD0F1-8E0E-46C2-9F32-F34F16CFE491", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c\\/ps:-:*:*:*:*:*:*:*", matchCriteriaId: "38472135-237B-4EE1-8D66-D94B6F3FCFD4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33F4CBF7-CBA2-438A-A997-ACDB83322F2C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c2:-:*:*:*:*:*:*:*", matchCriteriaId: "767EE0C3-16EC-4D40-A86D-B14586EF9AD5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-c2\\/tf_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2B122984-8F1E-4CBE-A127-2C7AA5BE1178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-c2\\/tf:-:*:*:*:*:*:*:*", matchCriteriaId: "AE17F92F-990E-4080-BEE0-9549FBDAAE0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-cs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13D9955B-57E0-404B-B677-0F0CBAB17606", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-cs:-:*:*:*:*:*:*:*", matchCriteriaId: "A1D30CDF-60B0-40B6-8F3E-4C68AD2F507C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-cs_x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61CFCE10-117B-4596-9EC8-0FD763D83445", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-cs_x:-:*:*:*:*:*:*:*", matchCriteriaId: "801129A7-C8A2-4D90-9C54-13FAC9B96762", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-cs\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7E870D6C-4C0F-4C70-A432-FD02CE45AEA6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-cs\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "AA55C126-A4D3-48D5-A277-772923EAA7DA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-d\\/exper\\/si_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "927D8CBD-EF57-48E2-A80C-E27907E72CED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-d\\/exper\\/si:-:*:*:*:*:*:*:*", matchCriteriaId: "1D6DF281-4E33-4DE5-B5F5-9FEA95885ADF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-k_x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "62A74624-952E-4342-BABF-9E59DE71A633", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-k_x:-:*:*:*:*:*:*:*", matchCriteriaId: "D1CC4DAA-79B1-4747-BE1E-69C194E6BCDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-ks_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F8B2CA4-B41E-4900-8F85-80A472670868", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-ks:-:*:*:*:*:*:*:*", matchCriteriaId: "FE12AD23-6AC5-4F08-B1B1-E59F728E9668", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-ks_r1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98B532EC-7D68-4F05-9C84-EB074A85A764", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-ks_r1:-:*:*:*:*:*:*:*", matchCriteriaId: "B97E501F-0C7F-4BA0-B04C-C8A623F7156F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-p\\/dvi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "75E4DEB7-3F0F-4C62-991B-5A75B27696AA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-p\\/dvi:-:*:*:*:*:*:*:*", matchCriteriaId: "F9810952-332C-4849-BB12-1253AF76E1BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-ts_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E3779667-7513-44D8-B2E5-1925594AD3E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-ts:-:*:*:*:*:*:*:*", matchCriteriaId: "C795E996-2996-4731-A78E-FFA9585DCD31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2058E0D4-EAEB-4CD1-AD89-BC69858B734A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "558AF38E-674A-49B5-A023-2043C89714E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110s1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E5E83F44-B421-4B24-BE8D-561D57883E54", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110s1:-:*:*:*:*:*:*:*", matchCriteriaId: "38AAA664-8BC3-413F-BB92-8BB6B3690EDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110s2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42CB2BDF-E9BF-4049-8D44-FD660AC60AAF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110s2:-:*:*:*:*:*:*:*", matchCriteriaId: "81F53F8B-379A-416E-A44D-38ED9499A120", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C47313A-2FBA-49AD-AD68-5F817411D994", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110t:-:*:*:*:*:*:*:*", matchCriteriaId: "A0232650-B917-4734-B322-D12ADB06B435", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110t-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48BC9BDF-0562-44FE-B2A5-F8B26B98D94D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "70A3F2A5-56BF-41E8-959B-0AFFCC130361", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B4A88EE-9112-40B0-8A11-4841550B5C3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-a\\/m.2:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A4787E-F9CA-45F2-B43A-3C9BAD580204", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D757A98E-209C-4391-9B7B-2CD60D5A4FB8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-d:-:*:*:*:*:*:*:*", matchCriteriaId: "A12979DE-AEC4-4D51-8E0A-E714C85F6D7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8FC08CFA-0254-41A0-8599-7F1033782B2A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-e:-:*:*:*:*:*:*:*", matchCriteriaId: "6367721C-A009-45AC-B272-8290A8331284", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-e\\/m.2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9617970B-9C4B-47D3-982D-8200BC52D0E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-e\\/m.2:-:*:*:*:*:*:*:*", matchCriteriaId: "2E1915CF-2419-4C1B-80B9-8D29D379E1FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "179BC9DB-AA35-4A54-8EB3-1DB295727997", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-f:-:*:*:*:*:*:*:*", matchCriteriaId: "D1B8722E-E334-47F3-A3BE-B9AB798A5305", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-k_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0E65AAA6-B29F-4859-9A99-591F6BD1371C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-k:-:*:*:*:*:*:*:*", matchCriteriaId: "D182935F-8629-4F9D-925D-A166007B446B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B54A67BA-C862-4BA0-94D2-13362FF2F26B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-a:-:*:*:*:*:*:*:*", matchCriteriaId: "975830EE-92F4-4614-9AE8-E9D5DBADE414", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:trooper_h110_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D12B0228-80F1-466D-86F2-57F7E7BA4095", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:trooper_h110_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "6B75FEA3-D643-4348-9FA8-07D3127C8D88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C6C8818-47EC-47B5-980F-5109C56C5C1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "85E4C230-C8B3-496E-9012-5CF032D420E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-r_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7952968-C3A8-40CA-8000-74B23C112AB0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-r:-:*:*:*:*:*:*:*", matchCriteriaId: "1C05633B-3CD2-429B-9239-DB6F189C8C79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h110m2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "87D53057-61DA-498B-B76D-6FB0FD50BF61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h110m2:-:*:*:*:*:*:*:*", matchCriteriaId: "4E222A3E-2E1E-4B46-A6DC-E91831CEA856", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h110m2\\/fpt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C7A40AA-4A94-4DB5-ACE5-048E7E1C998D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h110m2\\/fpt:-:*:*:*:*:*:*:*", matchCriteriaId: "D149B106-67CF-49A1-AE7D-CE3F3BC3F266", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h110m-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FC93A9D-E01B-40CD-95C8-A82085358E16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h110m-p:-:*:*:*:*:*:*:*", matchCriteriaId: "3E3D7210-68E7-4D3D-B65A-F7C200C07A95", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-k_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22F82466-28C5-4495-876C-4697AC0834E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-k_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "99B2BCE6-8BA3-4A11-B030-F571346AB3B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h110m-a_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "137F1817-ED86-4371-8553-70D415802E23", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h110m-a_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "EB077E96-C7D6-4314-92B3-52ED4B6C10BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CF58ED92-6E4B-4130-BAB0-81DA31518E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "B037D858-125F-4762-8DA2-09BA7807898D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170i-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5BC8AEFC-6BF0-497B-8BAF-7DA3EFB8FBD2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170i-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "1297573C-0F72-477A-B85C-0ED65412E893", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170_pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CEFFDE24-215A-43B8-9B3F-D73B52ECFD15", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170_pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "BED2A131-07A0-4E8B-8015-9E55DC1C6BF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "513A1D93-DE0D-4455-95C8-FC7AF72677D2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "59B4013A-5F8E-47AD-80D5-526A68281515", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170-pro\\/usb_3.1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "982E919B-4936-4BE3-955C-82FFEE504807", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170-pro\\/usb_3.1:-:*:*:*:*:*:*:*", matchCriteriaId: "7F7415EB-47BE-4F88-8310-9BB1CF0EF299", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04DD6014-6CF9-45AC-8A2E-0AD946B811C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170m-plus\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "7FE848FF-BB23-4D4F-AFFF-45EC87315A67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170-plus_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "756F0FED-9E9B-4540-A425-F7534C4BE070", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170-plus_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "918AB13E-43F3-47F2-98FA-56FE89CFB1FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:h170m-e_d3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2C797373-3D39-45AC-BF51-4D0FF6471D83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:h170m-e_d3:-:*:*:*:*:*:*:*", matchCriteriaId: "8B7EC3FF-81AF-40F4-98D0-4A1DFB937222", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b250-v7_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3D72C50-E023-44FE-B44A-EBB96883F234", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b250-v7:-:*:*:*:*:*:*:*", matchCriteriaId: "895AA24B-1419-4E66-8BE1-7D3439496FCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b250_mining_expert_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5BF02AB1-1C94-48A1-BCBD-A50F049DCA97", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b250_mining_expert:-:*:*:*:*:*:*:*", matchCriteriaId: "79A2E62F-94DC-4F76-BFB5-96B45E8E3364", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4BFF834F-54FD-4427-86BC-59CACB5720EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-d:-:*:*:*:*:*:*:*", matchCriteriaId: "FFFE0FB6-3E57-420E-BAFD-89C67EC8798C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9FC5BA59-2868-4066-B557-A337FCBEBAEE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250-a:-:*:*:*:*:*:*:*", matchCriteriaId: "9D54BCF0-396D-4AE9-BF98-408A30C23DFA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "712F55B3-C78D-4BB1-AC61-C6789997F830", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-a:-:*:*:*:*:*:*:*", matchCriteriaId: "2EE19287-8C71-4161-94C5-B31A2CA907FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-j_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AD1F89C-B419-43B7-8CEC-BBA00C0A33B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-j:-:*:*:*:*:*:*:*", matchCriteriaId: "E868B563-75A7-4E94-875F-BC0EA7AA228A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DA489C-E6A4-4F30-9CBF-D532D4DC4934", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "1E0A4463-96F7-4516-B91C-DFAFA98358D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42625B8C-5163-43B9-9DC8-E8AB1E1A6CF3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "6721CA1E-EEAC-4CF0-BB0C-4AE44049CDC6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-k_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB59C47E-47B5-41C4-A142-E818589D86A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-k:-:*:*:*:*:*:*:*", matchCriteriaId: "4512943B-7794-454B-A0AD-D1F7C23D00BB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9FB07DCB-5D90-4BDA-8277-99211DBB3BF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "9A4EC730-8E50-4274-99F8-B6A57C843546", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_b250i_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C4A7BB6-6E6D-48BD-9539-E01C801E2CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_b250i_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "89865346-0EC6-4C1C-92CC-231ECE6AF73F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_b250g_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F70AAD95-7460-49EE-BA18-4A9826658CDA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_b250g_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "2C326D51-0C5D-48CE-AF7B-73DF1BD08F67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_b250h_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "900ECAD1-0290-490E-BB94-82667C13B829", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_b250h_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "0760F2E1-5A01-40FC-9A2A-05C769D05986", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_b250f_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "20419867-19A3-41D0-AD4E-866B47035EF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_b250f_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "97D572B8-0F2C-48A9-B397-DA1FE92844B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b250m-c_pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E49CE82-A630-4BBA-AE5B-35E1D7FF299B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b250m-c_pro:-:*:*:*:*:*:*:*", matchCriteriaId: "CBE24086-8BC1-4B7C-BB2A-D4623A2841C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b250m-f_plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9941B2B-CE46-4669-947D-2BA09DEF6B1A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b250m-f_plus:-:*:*:*:*:*:*:*", matchCriteriaId: "CE77E05B-54E7-4691-AF93-ADC24AE07D9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b250-mr_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34DA5C31-71E8-4CEF-AEFD-0BD468E98870", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b250-mr:-:*:*:*:*:*:*:*", matchCriteriaId: "118522B5-3E87-4D27-9FC3-13F3AE4651BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:b250-s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6C02BD4-E46B-467A-8441-633933EE57E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:b250-s:-:*:*:*:*:*:*:*", matchCriteriaId: "A270BEB2-4073-457B-9E7A-041F25B00A70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b250m-v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4494A410-658A-4DC7-85C6-3792D4A4636D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b250m-v:-:*:*:*:*:*:*:*", matchCriteriaId: "2D5BAFA0-2A5C-47A4-BA7F-B5C6A0436A5F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b250m-v3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6928685-947A-444F-B242-55B30F2BD495", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b250m-v3:-:*:*:*:*:*:*:*", matchCriteriaId: "0170DE0A-DF4E-4881-9C66-9BF005897F12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:ex-b250m-v5_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F713C93B-03CC-4688-8590-81C84C52D10F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:ex-b250m-v5:-:*:*:*:*:*:*:*", matchCriteriaId: "A1D5135C-B68A-4D60-89A7-AA3FF6DC8508", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:pio-b250i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8F194921-25DA-40AD-AC77-A5C886E653DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:pio-b250i:-:*:*:*:*:*:*:*", matchCriteriaId: "16DB8D6C-64B9-4F5C-AFBB-EF32A2EF1949", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5B3E1D43-964F-4AC3-B0AA-E7D30F2135B7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-c:-:*:*:*:*:*:*:*", matchCriteriaId: "2E50A677-E925-4E60-8F81-FB8E4A8CCBF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_b250m-plus\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD09D5B3-575A-4941-99DF-C1CCB324EF0D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_b250m-plus\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "70A7A86F-A63B-4F2C-AE2C-7F321CA7E017", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h270-pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "894292B4-B683-4AE1-ACA0-07E14A7CAB04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h270-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "78B312D0-771C-4C55-92E7-E19A82201B94", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h270-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1A889C5B-AA38-4BEC-B9D9-C20BCD51ED34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h270-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "0E8466D0-3102-4301-8F34-69FDF5E2F760", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_h270i_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C297BE7C-ED2C-4E7C-888D-78C9246D3F4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_h270i_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "D92BB8F1-1C5D-4DDE-8A35-CFC96EEE2A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_h270f_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "76DB8A91-69F2-4028-AC04-B0FFCCFDD882", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_h270f_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "C85379BD-1976-43A2-87D0-B690B4A9440F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_h270m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "369BF713-2229-493B-902C-D23F3DFE504A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_h270m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "6DB699E7-4212-46C0-BBA0-A3A08AD6C225", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_ix_extreme_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C399C14-6B6D-4CFC-AB98-94FCA8B982EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_ix_extreme:-:*:*:*:*:*:*:*", matchCriteriaId: "A32D2A1B-DA72-4FF2-A1FD-804B1A3671B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_ix_formula_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "072786FB-D929-48A9-BBB7-7EC3899DC9A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_ix_formula:-:*:*:*:*:*:*:*", matchCriteriaId: "DCA041A0-8103-4742-BA97-FD28DD2EDEE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_ix_code_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "86C5F146-C7FD-4479-8E11-7443DCEA38ED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_ix_code:-:*:*:*:*:*:*:*", matchCriteriaId: "5FA3A7B7-27CF-467A-B387-1B5D6120C0B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_ix_apex_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CBCB7188-8D72-4619-9779-73B6586A18E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_ix_apex:-:*:*:*:*:*:*:*", matchCriteriaId: "92B48FFA-7FFE-44AB-9528-0681F631C1FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_ix_hero_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D402D3D7-319F-45D7-A5A2-8D1972D92F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_ix_hero:-:*:*:*:*:*:*:*", matchCriteriaId: "49D75118-242F-454C-97B6-9C50330E82BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "20F905D6-74DD-4547-82CF-AB43E3DD5AA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270-a:-:*:*:*:*:*:*:*", matchCriteriaId: "D84124C1-41B9-4963-9E2E-F84E356D2EC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270-ar_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60D56403-47C2-4321-BEB9-E08D392AE2CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270-ar:-:*:*:*:*:*:*:*", matchCriteriaId: "A522350E-2FCE-4DFA-A660-7FA0CD1462C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270e_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED821805-43F4-4594-8B34-9369A4A51919", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270e_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "6E59CD1D-24F8-40DD-BC34-1798B9BFD142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270f_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "47B55966-2BE6-43B7-B3B1-5AC2E476029D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270f_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "F80FE467-6745-462E-9602-D99EEFE4496F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270g_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1D51FA0-90A9-479D-9F0A-D0A8BFC5C6E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270g_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "E5D0B584-4C98-4C58-B098-153A07FA7B7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270h_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77D33D60-DE04-4189-A8E6-B453F566970A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270h_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "122BD789-E195-48C4-8043-E7C911809AF6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:tuf_z270_mark_1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F5C6507-2A00-4BEE-A2B0-9D0099DF4EC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:tuf_z270_mark_1:-:*:*:*:*:*:*:*", matchCriteriaId: "52653418-2D8C-464A-806A-0E5BB7C70C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:tuf_z270_mark_2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4AB056A-3C43-4C1A-8ECB-C8ACF645FFB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:tuf_z270_mark_2:-:*:*:*:*:*:*:*", matchCriteriaId: "098C6278-2B15-4D35-BDAD-6EABB5DE4A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270h_gaming\\/k1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE33B2CC-C64B-4983-928A-BE8332458922", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270h_gaming\\/k1:-:*:*:*:*:*:*:*", matchCriteriaId: "57DD3BFB-3AC5-43E8-AF3D-AA9DDC0E0B68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270-k_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63602AEB-A984-4556-B7B4-906BF0B1C4CB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270-k:-:*:*:*:*:*:*:*", matchCriteriaId: "69CACC60-EF0C-417B-8927-CBFDB90DE31D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D434C2FA-C27E-477F-A82E-4DB6B29F3162", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270-p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CBCF0D7-EACE-4368-AE89-F4B70BD583F8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z270i_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB7FA773-033A-4502-A675-25AA640A9C61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z270i_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "3CD3456D-04D8-4269-9971-D9245185FB63", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270m-plus_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4AE1333-6F84-4D66-B5D0-C4FE8A3360A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270m-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "801BA881-11C2-4042-87A1-6FDC643F2F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z270m-plus\\/br_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7710F47C-C723-4F97-8A17-1BA8F1005255", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z270m-plus\\/br:-:*:*:*:*:*:*:*", matchCriteriaId: "93B6459E-CE0C-4344-8D63-C0116AB32796", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170m-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9B69866D-4F3C-42B3-9B20-62137551CE9C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170m-c:-:*:*:*:*:*:*:*", matchCriteriaId: "B346C94B-7A59-47A1-B2F6-A888968B7FE3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170m-cm-b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9F09095A-1795-4FDB-A1B5-5FC584E1191F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170m-cm-b:-:*:*:*:*:*:*:*", matchCriteriaId: "88504A31-F003-4344-BD7E-A1D5F0970FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170s1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6D61D6C5-4FB2-410D-A74D-1792054C6C04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170s1:-:*:*:*:*:*:*:*", matchCriteriaId: "5650BA0D-6066-42A2-8062-3FF81009E10B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A3B9CE8-C405-4C88-A6B1-5D5A3414096D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170t:-:*:*:*:*:*:*:*", matchCriteriaId: "EF01DCA7-9A31-4B2F-A34A-FA45E97522F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170t_v2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77F596F0-6418-4D20-86C5-B48B027EC265", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170t_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "9F40FF26-207F-41C7-8E82-7AD6681AE0DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170m2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "59E33941-7E24-4FC8-941C-CC62B6B58822", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170m2:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B670DE-DB47-418B-A2C4-E68C49C2FAAE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q170m2\\/cdm\\/si_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69369624-8D90-4A2A-8B85-8884AC5CBD28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q170m2\\/cdm\\/si:-:*:*:*:*:*:*:*", matchCriteriaId: "A851E8E1-B1F0-4083-AFA8-3F59779F0206", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_q270m-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD61F9CE-68E5-481C-9711-B40343FF90CE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_q270m-c:-:*:*:*:*:*:*:*", matchCriteriaId: "56E41F36-3579-4AE4-8E7E-20D81962EA79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q270m-cm-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "233065C5-57E6-40E5-8A52-AE6D6F7196AA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q270m-cm-a:-:*:*:*:*:*:*:*", matchCriteriaId: "2A571EB0-25AB-4450-8847-042749CE5F7D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:q270-s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E8030ED2-0286-420A-B514-AC986C2700BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:q270-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F4E56764-2A59-4B73-89A1-9D391FE33D5A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_j3355i-c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0520B4BF-4363-4747-86A9-5D481927CF4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_j3355i-c:-:*:*:*:*:*:*:*", matchCriteriaId: "94719387-576F-4949-AA4D-6C8453085EBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_x_hero_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8F854F8A-CD36-4721-A1D2-5E6EC5D9FF45", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_x_hero:-:*:*:*:*:*:*:*", matchCriteriaId: "9820DF03-00B5-4363-AAE7-9D8F2FCBA91B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_x_formula_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DA24153A-AE9B-4F76-9DFF-E00AB46744BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_x_formula:-:*:*:*:*:*:*:*", matchCriteriaId: "86DEDFC2-7A73-40F6-BDCB-8E135BFC4EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_x_code_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53223DBA-DAA1-4942-92D1-68B7647D07AD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_x_code:-:*:*:*:*:*:*:*", matchCriteriaId: "8E633481-0AD2-4291-8653-FEB3DA5DA279", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_maximus_x_apex_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "272713A3-B88D-405B-AF30-FC6E90F2E3DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_maximus_x_apex:-:*:*:*:*:*:*:*", matchCriteriaId: "DCE784AA-CC5A-4995-92AC-28073BABD832", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z370-a_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C8260D7C-031B-489F-A7B9-1DEFC846BCD5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z370-a:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A56C38-B2C6-4F19-806A-9346190BD7AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:prime_z370-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C1536F2E-3181-4897-8ABD-AB2B939DF992", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:prime_z370-p:-:*:*:*:*:*:*:*", matchCriteriaId: "DD78127D-4BCD-4733-ABC1-D8558BE07C3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:tuf_z370-pro_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1419951-3645-4CBF-8EE0-209DC1727E92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:tuf_z370-pro_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "E78CF821-AFD7-4E76-BB94-A45495ABEC37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:tuf_z370-plus_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "060358B9-3630-421B-9366-F726D19C15D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:tuf_z370-plus_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "E8678C89-35A9-4256-AF4A-CC3A11BDB540", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z370-g_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1579A407-454F-4838-8850-8D4057507C8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z370-g_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "6A138826-DC79-4620-9142-2B7030DFCEAA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z370-e_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F050E14C-429C-421D-A01C-CC8E1DB40769", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z370-e_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "087C89AA-9876-4754-B2B1-CAE4F86D1375", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z370-f_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F62BFA52-B89C-410E-9FC6-B6F39825515A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z370-f_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "7B49B4BB-6D24-43A1-81DF-E786DFA600F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z370-h_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48EBFFF2-0AF5-43F7-AAC2-89F4625F9185", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z370-h_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "271701A1-CFD4-4781-9F81-3255D90F8EE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:asus:rog_strix_z370-i_gaming_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6681601-99E9-492B-86BF-9C3BE23D1E9C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:asus:rog_strix_z370-i_gaming:-:*:*:*:*:*:*:*", matchCriteriaId: "FA8A2D55-C766-4E90-BB0E-2D912F17C768", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A15E9E54-0414-4C67-9DCD-181FCF2EE838", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*", matchCriteriaId: "C6127C45-E91E-46B7-A806-FC0068575DB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4487A96-6AF1-4F41-9FF7-ED711FB89FA4", versionEndExcluding: "18.01.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADAD919-32C1-49D2-A419-C9A803DB6250", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0E79A718-EEED-4C35-8B3A-8BDEFBC55282", versionEndExcluding: "22.01.04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", matchCriteriaId: "506DEE00-30D2-4E29-9645-757EB8778C0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC70C5D2-748E-4D6C-ADC9-ED098541C8F1", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", matchCriteriaId: "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FDFE3D1F-F8B4-4682-BBCC-2CBD3CFFFBD4", versionEndExcluding: "21.01.07", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", matchCriteriaId: "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "631AF2A2-F925-45CB-82DE-39053016F5B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", matchCriteriaId: "754A6744-5194-4A99-BD3B-944A8707C80F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc477d_pro_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "71E7F6E0-9D8F-40CF-BC30-43505FE0CC16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc477d_pro:-:*:*:*:*:*:*:*", matchCriteriaId: "FAA84FF5-0C2A-48DE-94A5-ACB5B01E03EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90723D2B-49B7-4F70-9DD1-DE9F602E8DA2", versionEndExcluding: "21.01.07", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", matchCriteriaId: "FDF9D4C3-1892-48FA-95B4-835B636A4005", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42E364B9-1FC7-418A-860D-DD0E73DD930E", versionEndExcluding: "7.1.91.3272", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*", matchCriteriaId: "9DCF5972-C72D-4DE9-8B73-3C497D54596B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD389CE-AA26-445D-8D2B-27D3D06C3B68", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", matchCriteriaId: "D9DD4A97-1648-4C7F-A5A0-6899BD13A617", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BBC1791E-E3B5-4B75-B816-9EE20F44D9D6", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*", matchCriteriaId: "CD1A57A9-F6E5-4672-BD22-09EF5522CA10", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "042B60E7-0614-4EB3-8B47-07DEE5B5E274", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", matchCriteriaId: "509AD120-3465-4C00-AAB3-B6F6ED708B51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*", matchCriteriaId: "E752006C-6D94-4B14-B3A5-C9BB94141BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", matchCriteriaId: "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", matchCriteriaId: "057D9947-CE4A-4B4C-B721-4B29FB71350C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C5DA136-7541-44E4-B8DF-065CEE065A99", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*", matchCriteriaId: "1FFD2D72-5464-4B86-BACB-61F55A081C3A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C37BC27-C5B9-4740-BDFE-9439FB248CE6", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", matchCriteriaId: "E6D87239-40C1-4038-B734-D77AC4DDD571", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5C3B3FD-7CF7-4172-87EC-11C129D5508A", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*", matchCriteriaId: "687E1212-EC5A-47BA-ACAB-74F6C98B7C34", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4EAE137-9336-43D6-AF8A-9161F236BD14", versionEndExcluding: "9.1.41.3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", matchCriteriaId: "D8F37D88-E086-4060-8420-BD0F8D8FF580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D2F29FED-7876-4801-B0B1-BC06A30B1310", versionEndExcluding: "23.01.03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", matchCriteriaId: "187C6D51-5B86-484D-AE0F-26D1C9465580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3AD2CE43-B3B3-480B-A607-BB5817B43256", versionEndExcluding: "17.02.06.83.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*", matchCriteriaId: "A49883F4-8360-4895-8E9E-B274A35BDE57", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinumerik_pcu50.5-c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BF57DC28-0EF6-4610-8B3C-587B79740D25", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinumerik_pcu50.5-c:-:*:*:*:*:*:*:*", matchCriteriaId: "E921D034-33C4-4526-8F94-98D580922409", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "578D9CB9-6831-41C5-99C3-E1940562F118", versionEndExcluding: "6.2.61.3535", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinumerik_pcu50.5-p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CE0F71E-62D3-463E-9CE2-E088D6D3F05A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.", }, { lang: "es", value: "Múltiples desbordamientos de búfer en el kernel en Active Management Technology (AMT) en Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 permiten que un atacante con acceso local al sistema ejecute código arbitrario con el privilegio de ejecución AMT.", }, ], id: "CVE-2017-5711", lastModified: "2024-11-21T03:28:16.290", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-11-21T14:29:00.510", references: [ { source: "secure@intel.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101918", }, { source: "secure@intel.com", tags: [ "Issue Tracking", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039852", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", }, { source: "secure@intel.com", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", }, { source: "secure@intel.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20171120-0001/", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101918", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039852", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20171120-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2025-02-05 21:15
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA64798E-8B8B-4C7E-9858-F753C4E3EC27", versionEndExcluding: "11.8.93", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8", versionEndExcluding: "11.12.93", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA", versionEndExcluding: "11.22.93", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4E5F9366-71AC-4F8D-9500-52A963229564", versionEndExcluding: "12.0.92", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "490C0C69-3A37-408D-B779-61EA5A2BBBC5", versionEndExcluding: "14.1.67", versionStartIncluding: "14.1", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21FAE052-A535-4BC9-8298-8C5C47650BE6", versionEndExcluding: "15.0.42", versionStartIncluding: "15.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5B456C3-213F-4396-A168-1D039DA661A5", versionEndExcluding: "16.1.25", versionStartIncluding: "16.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.", }, { lang: "es", value: "Una desreferencia de puntero nulo en el firmware para Intel(R) AMT anterior a la versión 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario no autenticado habilite potencialmente la Denegación de Servicio (DoS) a través del acceso a la red.", }, ], id: "CVE-2022-27497", lastModified: "2025-02-05T21:15:16.263", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "secure@intel.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-11T16:15:13.443", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-476", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2017-05-02 14:59
Modified
2025-02-07 14:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
References
Impacted products
{ cisaActionDue: "2022-07-28", cisaExploitAdd: "2022-01-28", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability Privilege Escalation Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:*", matchCriteriaId: "BD4D2787-FA10-4B06-BC00-B869FB16A424", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:6.1:*:*:*:*:*:*:*", matchCriteriaId: "C11D072B-B549-4352-B0E5-2E7C1923161E", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:6.2:*:*:*:*:*:*:*", matchCriteriaId: "EED42746-4191-4188-8BAD-4A23B4D6B242", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:7.0:*:*:*:*:*:*:*", matchCriteriaId: "52652BE3-F695-42FB-A6FF-4A51DBA6789B", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:7.1:*:*:*:*:*:*:*", matchCriteriaId: "BD06FA87-E538-4492-9031-068CA05E63CB", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:8.0:*:*:*:*:*:*:*", matchCriteriaId: "CFFABA0B-46E6-4F2B-BA13-A48BF2587F68", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:8.1:*:*:*:*:*:*:*", matchCriteriaId: "4290CDD9-8D27-46AD-BEFC-36827FA4A348", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:9.0:*:*:*:*:*:*:*", matchCriteriaId: "09936A93-41E2-4293-B88B-4B7ED4E6FD44", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:9.1:*:*:*:*:*:*:*", matchCriteriaId: "A8855E63-AE6C-44A7-A2FE-7E4791C69BD4", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:9.5:*:*:*:*:*:*:*", matchCriteriaId: "7E92AF85-322D-4587-B393-62172EA51D62", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:10.0:*:*:*:*:*:*:*", matchCriteriaId: "BF833CF3-0170-491D-AEDB-33003B35B47B", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:11.0:*:*:*:*:*:*:*", matchCriteriaId: "6C27CD90-E986-4A89-B63E-1E3D2C62FBB3", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:11.5:*:*:*:*:*:*:*", matchCriteriaId: "4B71755C-4B29-4947-A436-1658097CD3F6", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:11.6:*:*:*:*:*:*:*", matchCriteriaId: "86388428-3285-4BC8-B0F2-2049B07711F0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).", }, { lang: "es", value: "Un atacante de red sin privilegios podría alcanzar privilegios del sistema para aprovisionar SKUs de administrabilidad Intel: Intel Active Management Technology (AMT) e Intel Standard Manageability (ISM). Un atacante local sin privilegios podría aprovisionar características de administrabilidad alcanzando privilegios de red o sistema local no privilegiados en SKUs de administrabilidad de Intel: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) e Intel Small Business Technology (SBT).", }, ], id: "CVE-2017-5689", lastModified: "2025-02-07T14:15:42.800", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2017-05-02T14:59:00.520", references: [ { source: "secure@intel.com", tags: [ "Patch", "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/98269", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038385", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf", }, { source: "secure@intel.com", tags: [ "Broken Link", ], url: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us", }, { source: "secure@intel.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20170509-0001/", }, { source: "secure@intel.com", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf", }, { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://www.embedi.com/news/mythbusters-cve-2017-5689", }, { source: "secure@intel.com", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/98269", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038385", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20170509-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.embedi.com/news/mythbusters-cve-2017-5689", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-269", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", }, { lang: "es", value: "Una lectura fuera de límites en el subsistema para Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso adyacente", }, ], id: "CVE-2020-8749", lastModified: "2024-11-21T05:39:22.543", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:17.533", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15", versionEndExcluding: "11.8.70", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", versionEndExcluding: "11.11.70", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43", versionEndExcluding: "11.22.70", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853", versionEndExcluding: "12.0.45", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", }, { lang: "es", value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente.", }, ], id: "CVE-2019-11088", lastModified: "2024-11-21T04:20:30.900", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-18T22:15:12.160", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Una comprobación de entrada inapropiada en Intel® AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red", }, ], id: "CVE-2020-0531", lastModified: "2024-11-21T04:53:41.047", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:10.113", references: [ { source: "secure@intel.com", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "1B273234-6A62-430D-AF97-DAE65C7B16EB", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "20684D0C-F699-4315-BB60-AAFA5E12D08A", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "68AA7FEC-EDAB-408D-B9E3-5DECD205186E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "2C01525A-E5F1-4F2A-B561-11874BAB7EA1", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "85F881D8-37D0-4391-8F95-71A70A4843B0", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.", }, { lang: "es", value: "Una escritura fuera de límites en el subsistema IPv6 para Intel® AMT, Intel® ISM versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso de red", }, ], id: "CVE-2020-8752", lastModified: "2024-11-21T05:39:22.827", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:17.753", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2025-02-05 21:15
Severity ?
8.7 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA64798E-8B8B-4C7E-9858-F753C4E3EC27", versionEndExcluding: "11.8.93", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8", versionEndExcluding: "11.12.93", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA", versionEndExcluding: "11.22.93", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4E5F9366-71AC-4F8D-9500-52A963229564", versionEndExcluding: "12.0.92", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "490C0C69-3A37-408D-B779-61EA5A2BBBC5", versionEndExcluding: "14.1.67", versionStartIncluding: "14.1", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21FAE052-A535-4BC9-8298-8C5C47650BE6", versionEndExcluding: "15.0.42", versionStartIncluding: "15.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5B456C3-213F-4396-A168-1D039DA661A5", versionEndExcluding: "16.1.25", versionStartIncluding: "16.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, { lang: "es", value: "La autenticación incorrecta en el firmware de Intel(R) AMT anterior a las versiones 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios a través del acceso a la red.", }, ], id: "CVE-2022-26845", lastModified: "2025-02-05T21:15:15.827", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.8, source: "secure@intel.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-11T16:15:13.177", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Una comprobación de entrada inapropiada en Intel® AMT versiones anteriores a 11.8.76, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red", }, ], id: "CVE-2020-0535", lastModified: "2024-11-21T04:53:41.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:10.707", references: [ { source: "secure@intel.com", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "1B273234-6A62-430D-AF97-DAE65C7B16EB", versionEndExcluding: "11.8.80", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "20684D0C-F699-4315-BB60-AAFA5E12D08A", versionEndExcluding: "11.12.80", versionStartIncluding: "11.12.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "68AA7FEC-EDAB-408D-B9E3-5DECD205186E", versionEndExcluding: "11.22.80", versionStartIncluding: "11.22.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "2C01525A-E5F1-4F2A-B561-11874BAB7EA1", versionEndExcluding: "12.0.70", versionStartIncluding: "12.0", vulnerable: true, }, { criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", matchCriteriaId: "85F881D8-37D0-4391-8F95-71A70A4843B0", versionEndExcluding: "14.0.45", versionStartIncluding: "14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Una lectura fuera de límites en el subsistema para Intel® AMT, Intel® ISM versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, pueden habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información por medio de un acceso de red", }, ], id: "CVE-2020-8754", lastModified: "2024-11-21T05:39:23.017", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:17.907", references: [ { source: "secure@intel.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20201113-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Severity ?
Summary
Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr | Issue Tracking, Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*", matchCriteriaId: "6011F809-FD13-458A-9DBF-89499A3D60D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*", matchCriteriaId: "8A1F7C3F-7685-45F0-B4E6-C2CE4248B5B4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*", matchCriteriaId: "166B009B-E62A-4377-A624-CB90E2909571", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*", matchCriteriaId: "0002E3FA-3A2D-47DF-BD9A-62C80DD750E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*", matchCriteriaId: "F5F0A534-7CC5-477F-AC5A-5F3C16481884", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*", matchCriteriaId: "141446CB-9BBF-451B-A8F9-67A4A301579B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wireless-n_7260:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F3AFD4-764C-4D33-924E-62B322D56450", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wireless-n_7260:-:*:*:*:*:*:*:*", matchCriteriaId: "CC86AE37-F425-4CD7-B061-2B784BC6778D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*", matchCriteriaId: "166B009B-E62A-4377-A624-CB90E2909571", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*", matchCriteriaId: "0002E3FA-3A2D-47DF-BD9A-62C80DD750E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD6C9E-E0AA-4A52-A4F6-3B4355CCB916", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "CA712BE4-ADA2-4907-B813-D21C6E89629F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "F33E597F-1CD3-462F-9F0F-EA5D98D0A903", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "F727FF41-F05C-42D5-B39C-9C97D90DE9FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wireless-n_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "9D460DFD-0726-45B8-BF00-3F5AEE9B3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "6EE338FD-FCA9-4725-AAE7-E12FA7B197B4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "20D3A26C-22CF-43C5-90D1-E4B4AEDCB629", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD6C9E-E0AA-4A52-A4F6-3B4355CCB916", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "CA712BE4-ADA2-4907-B813-D21C6E89629F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "F33E597F-1CD3-462F-9F0F-EA5D98D0A903", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "F727FF41-F05C-42D5-B39C-9C97D90DE9FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wireless-n_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "9D460DFD-0726-45B8-BF00-3F5AEE9B3024", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*", matchCriteriaId: "6EE338FD-FCA9-4725-AAE7-E12FA7B197B4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "0D2333DD-4F31-4056-B0C4-C5C13FCB563D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*", matchCriteriaId: "1622BAB2-9B31-417B-A89D-89A3E9E95DA0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*", matchCriteriaId: "620E5F09-EEA6-4093-82E2-7A28C7E7DD9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "D6154064-485F-47F7-BB1A-5AD773C7E98D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*", matchCriteriaId: "35A485AB-75ED-4E42-A24C-2F19DF98CF5D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*", matchCriteriaId: "15745BD1-2362-4747-8C45-21AF5309BE3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "4F55A6BA-2963-4EA1-BB5F-07C990D80D5B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*", matchCriteriaId: "18E0621E-A491-4345-BD3F-14CC2C806706", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*", matchCriteriaId: "1868F499-00F3-4393-890B-6C8BE3E4A8AB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wireless-ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "F16E7E98-9047-44A4-8C19-69FF07699333", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wireless-ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "F16E7E98-9047-44A4-8C19-69FF07699333", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C27BBB6-B4B7-43E4-8F42-42097C3BFE3D", versionEndIncluding: "11.8.50.3420", versionStartIncluding: "11.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.", }, { lang: "es", value: "Vulnerabilidad de reproducción de tramas en el subsistema Wi-Fi en productos Intel Dual-Band y Tri-Band Wireless-AC permite que un atacante remoto reproduzca tramas mediante un ataque Man-in-the-Middle (MitM) basado en canales.", }, ], id: "CVE-2017-5729", lastModified: "2024-11-21T03:28:18.313", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-11-21T14:29:00.620", references: [ { source: "secure@intel.com", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", versionEndExcluding: "11.8.77", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9", versionEndExcluding: "11.12.77", versionStartIncluding: "11.10", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", versionEndExcluding: "11.22.77", versionStartIncluding: "11.20", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55", versionEndExcluding: "12.0.64", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.", }, { lang: "es", value: "Una comprobación de entrada inapropiada en el subsistema para Intel® AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario privilegiado habilitar potencialmente una denegación de servicio por medio de un acceso de red", }, ], id: "CVE-2020-0537", lastModified: "2024-11-21T04:53:41.717", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-15T14:15:10.847", references: [ { source: "secure@intel.com", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "secure@intel.com", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20200611-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.lenovo.com/de/en/product_security/len-30041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }